INFO: task kworker/0:0:9 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:9 tgid:9 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df83dd84 r8:00000002 r7:60000013 r6:df83dd8c r5:83236000 r4:83236000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83236000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df83de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dc6480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83236000 r7:00000000 r6:83018000 r5:00001000 r4:7f1e5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed48b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d6578c r4:85d65400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d6578c r4:830b8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83236000 r8:830b842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:8027f5e8 r7:df819e48 r6:830b8480 r5:83236000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf83dfb0 to 0xdf83dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830b7180 INFO: task kworker/0:0:9 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8b468000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:83242400 r4:83242400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83242400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c9740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84367f8c r4:84367c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84367f8c r4:830cd080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83242400 r8:830cd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cd080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd080 r8:8027f5e8 r7:df819d50 r6:830cd100 r5:83242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8c0c6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:2:97 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:2 state:D stack:0 pid:97 tgid:97 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9d1d84 r8:00000002 r7:60000113 r6:df9d1d8c r5:832f0c00 r4:832f0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8583ed00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832f0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84509b8c r4:84509800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84509b8c r4:832bd680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f0c00 r8:832bd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832bd680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832bd680 r8:8027f5e8 r7:df879e60 r6:832bd700 r5:832f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:832bccc0 INFO: task kworker/1:2:97 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8c0c6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/0:2:3097 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:2 state:D stack:0 pid:3097 tgid:3097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df979d84 r8:00000002 r7:60000013 r6:df979d8c r5:8388e000 r4:8388e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8388e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df979e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85dc6740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8388e000 r7:00000000 r6:83018000 r5:00001000 r4:7f1ed000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed5dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85d6638c r4:85d66000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d6638c r4:847ce400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8388e000 r8:847ce42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847ce400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847ce400 r8:8027f5e8 r7:df845e60 r6:847cef80 r5:8388e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf979fb0 to 0xdf979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:842fbd00 INFO: task kworker/0:2:3097 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8c943000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/0:5:3117 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3117 tgid:3117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df885d84 r8:00000002 r7:60000113 r6:df885d8c r5:833a2400 r4:833a2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:833a2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df885e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85140d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:833a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaea3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85228b8c r4:85228800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85228b8c r4:84858300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:833a2400 r8:8485832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84858300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84858300 r8:8027f5e8 r7:df845e60 r6:84858900 r5:833a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf885fb0 to 0xdf885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847999c0 INFO: task kworker/0:5:3117 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8cd3c000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/0:8:3124 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3124 tgid:3124 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa05d84 r8:00000002 r7:60000013 r6:dfa05d8c r5:8330bc00 r4:8330bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8330bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa05e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515e040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8330bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df985000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850da38c r4:850da000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850da38c r4:847cec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330bc00 r8:847cec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cec00 r8:8027f5e8 r7:df885e60 r6:83b9ce80 r5:8330bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa05fb0 to 0xdfa05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84799f00 INFO: task kworker/0:8:3124 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8cfce000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:3:3125 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3125 tgid:3125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:83308c00 r4:83308c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83308c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84837580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83308c00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85058f8c r4:85058c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85058f8c r4:83349880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83308c00 r8:833498ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83349880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83349880 r8:8027f5e8 r7:df879e60 r6:83349800 r5:83308c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:3:3125 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8d753000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:4:3127 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:4 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa0dd84 r8:00000002 r7:60000113 r6:dfa0dd8c r5:8330c800 r4:8330c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8330c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ba8c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8330c800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85059f8c r4:85059c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85059f8c r4:83363700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330c800 r8:8336372c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83363700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83363700 r8:8027f5e8 r7:dfa09e60 r6:83363680 r5:8330c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:4:3127 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8d753000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:5:3128 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3128 tgid:3128 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:8330a400 r4:8330a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8330a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ba780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8330a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbe1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85059b8c r4:85059800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85059b8c r4:8467fb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8330a400 r8:8467fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8467fb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8467fb00 r8:8027f5e8 r7:dfa0de60 r6:848c1000 r5:8330a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:5:3128 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8da84000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:6:3129 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3129 tgid:3129 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa15d84 r8:00000002 r7:60000113 r6:dfa15d8c r5:83252400 r4:83252400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83252400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa15e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85422380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83252400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85621f8c r4:85621c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85621f8c r4:848c1080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83252400 r8:848c10ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1080 r8:8027f5e8 r7:dfa11e60 r6:848c1100 r5:83252400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa15fb0 to 0xdfa15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:6:3129 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8dd97000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:7:3130 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa19d84 r8:00000002 r7:60000113 r6:dfa19d8c r5:83a91800 r4:83a91800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a91800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ba6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a91800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505978c r4:85059400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8505978c r4:848c1180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a91800 r8:848c11ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1180 r8:8027f5e8 r7:dfa15e60 r6:848c1200 r5:83a91800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa19fb0 to 0xdfa19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917b40 INFO: task kworker/1:7:3130 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8e29d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3131 blocked for more than 450 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3131 tgid:3131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df9edd84 r8:00000002 r7:60000113 r6:df9edd8c r5:83a93000 r4:83a93000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a93000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9ede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552cc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a93000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd1f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560df8c r4:8560dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8560df8c r4:848c1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a93000 r8:848c12ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1280 r8:8027f5e8 r7:dfa15e60 r6:848c1300 r5:83a93000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9edfb0 to 0xdf9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8484f600 INFO: task kworker/1:8:3131 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8ebc6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3135 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3135 tgid:3135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa29d84 r8:00000002 r7:60000013 r6:dfa29d8c r5:841c0000 r4:841c0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd45000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f7f8c r4:851f7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f7f8c r4:847cef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c0000 r8:847cef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:847cef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:847cef00 r8:8027f5e8 r7:df885e60 r6:83db2880 r5:841c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c100 INFO: task kworker/0:9:3135 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8f5d4000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3137 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3137 tgid:3137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa3dd84 r8:00000002 r7:60000113 r6:dfa3dd8c r5:841c4800 r4:841c4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa3de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85159500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8522bb8c r4:8522b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522bb8c r4:830cd300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c4800 r8:830cd32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cd300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd300 r8:8027f5e8 r7:df885e60 r6:830cd400 r5:841c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa3dfb0 to 0xdfa3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c400 INFO: task kworker/0:10:3137 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8f7a0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3139 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:841c6c00 r4:841c6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdc500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb26d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531f78c r4:8531f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8531f78c r4:830cd280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c6c00 r8:830cd2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cd280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cd280 r8:8027f5e8 r7:dfa3de60 r6:830cd380 r5:841c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c380 INFO: task kworker/0:11:3139 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8fc07000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3140 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:841c0c00 r4:841c0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489c600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa3f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8439eb8c r4:8439e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439eb8c r4:832bd780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c0c00 r8:832bd7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:832bd780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832bd780 r8:8027f5e8 r7:dfa49e60 r6:832bd600 r5:841c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c380 INFO: task kworker/0:12:3140 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8fd9b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3142 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa65d84 r8:00000002 r7:60000113 r6:dfa65d8c r5:83a94800 r4:83a94800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a94800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84359b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a94800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0895000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531cb8c r4:8531c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8531cb8c r4:832bd180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a94800 r8:832bd1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:832bd180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832bd180 r8:8027f5e8 r7:dfa49e60 r6:848c1380 r5:83a94800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa65fb0 to 0xdfa65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c880 INFO: task kworker/0:13:3142 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 8fd9b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3145 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3145 tgid:3145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa7dd84 r8:00000002 r7:60000113 r6:dfa7dd8c r5:83a90000 r4:83a90000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a90000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa7de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850070c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a90000 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4e1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85334f8c r4:85334c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85334f8c r4:832a1980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a90000 r8:832a19ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1980 r8:8027f5e8 r7:dfa49e60 r6:848c1400 r5:83a90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa7dfb0 to 0xdfa7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c840 INFO: task kworker/0:14:3145 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 900a0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3146 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3146 tgid:3146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:83a93c00 r4:83a93c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a93c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f5400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8439f78c r4:8439f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439f78c r4:832a1900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a93c00 r8:832a192c r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1900 r8:8027f5e8 r7:dfa7de60 r6:848c1480 r5:83a93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c840 INFO: task kworker/0:15:3146 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90444000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3148 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:832f0000 r4:832f0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85007e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e084d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533578c r4:85335400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533578c r4:832a1500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f0000 r8:832a152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1500 r8:8027f5e8 r7:dfa7de60 r6:848c1500 r5:832f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c980 INFO: task kworker/0:16:3148 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90483000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3150 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3150 tgid:3150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa9dd84 r8:00000002 r7:60000113 r6:dfa9dd8c r5:832f6000 r4:832f6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa9de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85007580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533538c r4:85335000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533538c r4:832a1480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f6000 r8:832a14ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:832a1480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a1480 r8:8027f5e8 r7:dfa7de60 r6:848c1580 r5:832f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa9dfb0 to 0xdfa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489cd80 INFO: task kworker/0:17:3150 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90483000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3152 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3152 tgid:3152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaa5d84 r8:00000002 r7:60000113 r6:dfaa5d8c r5:832f5400 r4:832f5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85410600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb021000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85334b8c r4:85334800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85334b8c r4:832bd100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f5400 r8:832bd12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:832bd100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832bd100 r8:8027f5e8 r7:dfa9de60 r6:848c1600 r5:832f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa5fb0 to 0xdfaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489cbc0 INFO: task kworker/0:18:3152 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9068a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3155 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:832f1800 r4:832f1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550fe40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547c78c r4:8547c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547c78c r4:845d9a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f1800 r8:845d9a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:845d9a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9a00 r8:8027f5e8 r7:dfa9de60 r6:848c1680 r5:832f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489ce80 INFO: task kworker/0:19:3155 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90922000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3156 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3156 tgid:3156 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfab9d84 r8:00000002 r7:60000113 r6:dfab9d8c r5:832f3000 r4:832f3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:832f3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cd140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:832f3000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548a38c r4:8548a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548a38c r4:845d9a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:832f3000 r8:845d9aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:845d9a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:845d9a80 r8:8027f5e8 r7:dfab5e60 r6:848c1700 r5:832f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab9fb0 to 0xdfab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489cf00 INFO: task kworker/0:20:3156 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90d91000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3159 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3159 tgid:3159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfac9d84 r8:00000002 r7:60000113 r6:dfac9d8c r5:83a96c00 r4:83a96c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a96c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfac9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500f380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83a96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb765000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548b38c r4:8548b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548b38c r4:83358080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a96c00 r8:833580ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83358080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83358080 r8:8027f5e8 r7:dfab9e60 r6:848c1800 r5:83a96c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfac9fb0 to 0xdfac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd240 INFO: task kworker/0:21:3159 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 90d91000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3161 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3161 tgid:3161 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfad5d84 r8:00000002 r7:60000113 r6:dfad5d8c r5:8407d400 r4:8407d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8500fac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8407d400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548bb8c r4:8548b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548bb8c r4:83358000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407d400 r8:8335802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83358000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83358000 r8:8027f5e8 r7:dfac9e60 r6:848c1880 r5:8407d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad5fb0 to 0xdfad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd180 INFO: task kworker/0:22:3161 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9159f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3163 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:8407c800 r4:8407c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85143b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8407c800 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548bf8c r4:8548bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548bf8c r4:848d1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407c800 r8:848d102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1000 r8:8027f5e8 r7:dfad5e60 r6:848c1900 r5:8407c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd4c0 INFO: task kworker/0:23:3163 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9159f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3165 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3165 tgid:3165 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:8407a400 r4:8407a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d5500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8407a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba27000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562278c r4:85622400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562278c r4:848d1080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407a400 r8:848d10ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1080 r8:8027f5e8 r7:dfae5e60 r6:848c1980 r5:8407a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd580 INFO: task kworker/0:24:3165 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 91cfb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3167 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa51d84 r8:00000002 r7:60000113 r6:dfa51d8c r5:84079800 r4:84079800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84079800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa51e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84079800 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc89000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85891b8c r4:85891800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85891b8c r4:848c1a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84079800 r8:848c1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1a00 r8:8027f5e8 r7:dfa15e60 r6:848c1a80 r5:84079800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa51fb0 to 0xdfa51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c2980 INFO: task kworker/1:9:3167 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 91cfb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3170 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3170 tgid:3170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfaddd84 r8:00000002 r7:60000113 r6:dfaddd8c r5:84078000 r4:84078000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84078000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfadde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857d5600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84078000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85622b8c r4:85622800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85622b8c r4:848d1100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84078000 r8:848d112c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1100 r8:8027f5e8 r7:dfaede60 r6:848c1b00 r5:84078000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaddfb0 to 0xdfaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd900 INFO: task kworker/0:25:3170 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 91e97000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3171 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb09d84 r8:00000002 r7:60000113 r6:dfb09d8c r5:8407bc00 r4:8407bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857de840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8407bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb687000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85776f8c r4:85776c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85776f8c r4:848d1180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407bc00 r8:848d11ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1180 r8:8027f5e8 r7:dfaede60 r6:848c1b80 r5:8407bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb09fb0 to 0xdfb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd900 INFO: task kworker/0:26:3171 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 92329000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3173 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb11d84 r8:00000002 r7:60000013 r6:dfb11d8c r5:8407b000 r4:8407b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8407b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:858438c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8407b000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85731f8c r4:85731c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85731f8c r4:848c1c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8407b000 r8:848c1c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1c00 r8:8027f5e8 r7:dfa51e60 r6:848c1c80 r5:8407b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb11fb0 to 0xdfb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c2400 INFO: task kworker/1:10:3173 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 92581000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3175 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb15d84 r8:00000002 r7:60000013 r6:dfb15d8c r5:83316000 r4:83316000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83316000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cf8c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83316000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d378c r4:857d3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d378c r4:848d1200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83316000 r8:848d122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1200 r8:8027f5e8 r7:dfb09e60 r6:848c1d00 r5:83316000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cda00 INFO: task kworker/0:27:3175 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 92581000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3176 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3176 tgid:3176 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb19d84 r8:00000002 r7:60000013 r6:dfb19d8c r5:83312400 r4:83312400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83312400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f18c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83312400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562378c r4:85623400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562378c r4:848d1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83312400 r8:848d12ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1280 r8:8027f5e8 r7:dfb15e60 r6:848c1d80 r5:83312400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb19fb0 to 0xdfb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cdbc0 INFO: task kworker/0:28:3176 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 929d8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3179 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3179 tgid:3179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:83314800 r4:83314800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83314800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85529c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83314800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df901000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d3b8c r4:857d3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857d3b8c r4:848d1300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83314800 r8:848d132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1300 r8:8027f5e8 r7:dfb15e60 r6:848c1e00 r5:83314800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd900 INFO: task kworker/0:29:3179 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 929d8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3182 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa5dd84 r8:00000002 r7:60000013 r6:dfa5dd8c r5:83a8ec00 r4:83a8ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a8ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa5de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe89000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85892f8c r4:85892c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85892f8c r4:848c1e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a8ec00 r8:848c1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1e80 r8:8027f5e8 r7:dfa51e60 r6:848c1f00 r5:83a8ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa5dfb0 to 0xdfa5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cf540 INFO: task kworker/1:11:3182 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9322f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3187 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb31d84 r8:00000002 r7:60000013 r6:dfb31d8c r5:83a8b000 r4:83a8b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83a8b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb31e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83a8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe35000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589278c r4:85892400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589278c r4:848c1780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83a8b000 r8:848c17ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c1780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c1780 r8:8027f5e8 r7:dfa51e60 r6:848c3000 r5:83a8b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb31fb0 to 0xdfb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cf680 INFO: task kworker/1:12:3187 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9322f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3188 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3188 tgid:3188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb3dd84 r8:00000002 r7:60000113 r6:dfb3dd8c r5:83243c00 r4:83243c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83243c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb3de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589078c r4:85890400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589078c r4:848c3080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83243c00 r8:848c30ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3080 r8:8027f5e8 r7:dfa51e60 r6:848c3100 r5:83243c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb3dfb0 to 0xdfb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cf680 INFO: task kworker/1:13:3188 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 936c7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3191 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3191 tgid:3191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb45d84 r8:00000002 r7:60000013 r6:dfb45d8c r5:83244800 r4:83244800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83244800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb45e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83244800 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85892b8c r4:85892800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85892b8c r4:848c3180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83244800 r8:848c31ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3180 r8:8027f5e8 r7:dfa51e60 r6:848c3200 r5:83244800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb45fb0 to 0xdfb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cf900 INFO: task kworker/1:14:3191 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 936c7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3193 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb59d84 r8:00000002 r7:60000113 r6:dfb59d8c r5:83865400 r4:83865400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83865400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85a15ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83865400 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec93f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85a7638c r4:85a76000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85a7638c r4:848d1480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83865400 r8:848d14ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848d1480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d1480 r8:8027f5e8 r7:dfb2de60 r6:848c3300 r5:83865400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb59fb0 to 0xdfb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489cf80 INFO: task kworker/0:31:3193 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 93b5a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3194 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3194 tgid:3194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb51d84 r8:00000002 r7:60000013 r6:dfb51d8c r5:84339800 r4:84339800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84339800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84339800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589238c r4:85892000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589238c r4:848c3380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84339800 r8:848c33ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3380 r8:8027f5e8 r7:dfa51e60 r6:848c3400 r5:84339800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cfbc0 INFO: task kworker/1:15:3194 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 93d07000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3195 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb6dd84 r8:00000002 r7:60000013 r6:dfb6dd8c r5:841c3000 r4:841c3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb6de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85891f8c r4:85891c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85891f8c r4:848c3280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c3000 r8:848c32ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3280 r8:8027f5e8 r7:dfa51e60 r6:848d1500 r5:841c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb6dfb0 to 0xdfb6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cfbc0 INFO: task kworker/1:16:3195 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 93d07000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3198 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:8433d400 r4:8433d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8433d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85850580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8433d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9e1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d0f8c r4:857d0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d0f8c r4:848c3480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8433d400 r8:848c34ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3480 r8:8027f5e8 r7:dfa51e60 r6:848c3500 r5:8433d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cda80 INFO: task kworker/1:17:3198 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 93d07000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3200 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb7dd84 r8:00000002 r7:60000113 r6:dfb7dd8c r5:8433ec00 r4:8433ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8433ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb7de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8433ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85890f8c r4:85890c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85890f8c r4:848c3580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8433ec00 r8:848c35ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3580 r8:8027f5e8 r7:dfb65e60 r6:848c3600 r5:8433ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb7dfb0 to 0xdfb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917300 INFO: task kworker/1:18:3200 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 94481000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3202 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb85d84 r8:00000002 r7:60000113 r6:dfb85d8c r5:8433bc00 r4:8433bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8433bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb85e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8433bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc47000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589178c r4:85891400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589178c r4:848c3680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8433bc00 r8:848c36ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3680 r8:8027f5e8 r7:dfb7de60 r6:848c3700 r5:8433bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb85fb0 to 0xdfb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917300 INFO: task kworker/1:19:3202 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 94824000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3203 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3203 tgid:3203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:8433b000 r4:8433b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8433b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cf340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8433b000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba41000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589138c r4:85891000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589138c r4:848c3780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8433b000 r8:848c37ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3780 r8:8027f5e8 r7:dfb7de60 r6:848d1580 r5:8433b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917300 INFO: task kworker/1:20:3203 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 94951000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3206 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3206 tgid:3206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfba9d84 r8:00000002 r7:60000113 r6:dfba9d8c r5:841f4800 r4:841f4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841f4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca4f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85893b8c r4:85893800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85893b8c r4:848c3800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841f4800 r8:848c382c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3800 r8:8027f5e8 r7:dfb7de60 r6:848d1600 r5:841f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba9fb0 to 0xdfba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848912c0 INFO: task kworker/1:21:3206 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 94951000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3208 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbb5d84 r8:00000002 r7:60000113 r6:dfbb5d8c r5:841c1800 r4:841c1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:857d278c r4:857d2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d278c r4:848c3880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c1800 r8:848c38ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3880 r8:8027f5e8 r7:dfba9e60 r6:848d1680 r5:841c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb5fb0 to 0xdfbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84891400 INFO: task kworker/1:22:3208 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 95502000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3209 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3209 tgid:3209 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb91d84 r8:00000002 r7:60000113 r6:dfb91d8c r5:841e6c00 r4:841e6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841e6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebec3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589338c r4:85893000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589338c r4:848c3900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841e6c00 r8:848c392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3900 r8:8027f5e8 r7:dfba9e60 r6:848c3980 r5:841e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84891100 INFO: task kworker/1:23:3209 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 95b9a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:24:3212 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:24 state:D stack:0 pid:3212 tgid:3212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbc1d84 r8:00000002 r7:60000113 r6:dfbc1d8c r5:83ad3000 r4:83ad3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ad3000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec81b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589378c r4:85893400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589378c r4:848c3a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad3000 r8:848c3a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3a00 r8:8027f5e8 r7:dfba9e60 r6:848c3a80 r5:83ad3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc1fb0 to 0xdfbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84891440 INFO: task kworker/1:24:3212 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 96337000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3214 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3214 tgid:3214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbc9d84 r8:00000002 r7:60000113 r6:dfbc9d8c r5:841eb000 r4:841eb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841eb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecab9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85893f8c r4:85893c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85893f8c r4:848c3b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841eb000 r8:848c3b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3b00 r8:8027f5e8 r7:dfba9e60 r6:848c3b80 r5:841eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc9fb0 to 0xdfbc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84891680 INFO: task kworker/1:25:3214 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 96337000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3217 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3217 tgid:3217 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbddd84 r8:00000002 r7:60000113 r6:dfbddd8c r5:841ed400 r4:841ed400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841ed400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbdde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecae1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589c38c r4:8589c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589c38c r4:848c3c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841ed400 r8:848c3c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848c3c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848c3c00 r8:8027f5e8 r7:dfbc9e60 r6:848c3c80 r5:841ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbddfb0 to 0xdfbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848917c0 INFO: task kworker/1:26:3217 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 967b0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3218 blocked for more than 451 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3218 tgid:3218 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:841e9800 r4:841e9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841e9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f4ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecacf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450bf8c r4:8450bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8450bf8c r4:848c3d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 Workqueue: events bpf_prog_free_deferred [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 96abd000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84be4100 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ed563000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 5d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0635dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:29:3224 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:29 state:D stack:0 pid:3224 tgid:3224 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:841ebc00 r4:841ebc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841ebc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018205 r8:841ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 r5:00001000 r4:ecaed000 r5:8589c78c r4:8589c400 r10:61c88647 r9:841ebc00 r8:848c3fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) r4:84791100 Call trace: r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9734e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84be5080 Exception stack(0xe0635fb0 to 0xe0635ff8) Not tainted 6.15.0-syzkaller #0 r5:848f8000 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb99e08 r5:00001000 r4:ecb0b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589cb8c r4:8589c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589cb8c r4:84834080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f8000 r8:848340ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834080 r8:8027f5e8 r7:dfbfde60 r6:84834100 r5:848f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb99fb0 to 0xdfb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791200 INFO: task kworker/1:30:3226 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 5d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0635dc0 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:31:3229 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:31 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc19d84 r8:00000002 r7:60000113 r6:dfc19d8c r5:848f8c00 r4:848f8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb13000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589cf8c r4:8589cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589cf8c r4:84834200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f8c00 r8:8483422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834200 r8:8027f5e8 r7:dfbfde60 r6:84834280 r5:848f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: Exception stack(0xe0635d28 to 0xe0635d70) r4:00000000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 r4:848f9800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d040 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xdfc11fb0 to 0xdfc11ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 97f4a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:e01b1000 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r5:00001000 r4:ecb61000 r10:61c88647 r9:848fa400 r8:8483442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84be4100 r10:829188dc r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:848fb000 r5:848fb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fb000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589db8c r4:8589d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589db8c r4:84834500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fb000 r8:8483452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834500 r8:8027f5e8 r7:dfc25e60 r6:84834580 r5:848fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791780 INFO: task kworker/1:34:3234 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 98f47000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 r5:8436438c r4:84364000 r4:84be5080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ecb7f000 r7:ddde2d80 r6:83018200 r5:8589e78c r4:84834600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:847919c0 INFO: task kworker/1:35:3236 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 98f47000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:36:3238 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:36 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc41d84 r8:00000002 r7:60000013 r6:dfc41d8c r5:848fc800 r4:848fc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc41e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fc800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc53000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589ef8c r4:8589ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589ef8c r4:84834700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fc800 r8:8483472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834700 r8:8027f5e8 r7:dfc39e60 r6:84834780 r5:848fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc41fb0 to 0xdfc41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791780 INFO: task kworker/1:36:3238 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 98f47000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:37:3240 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:37 state:D stack:0 pid:3240 tgid:3240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc61d84 r8:00000002 r7:60000113 r6:dfc61d8c r5:83ac6000 r4:83ac6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac6000 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc45000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589eb8c r4:8589e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589eb8c r4:84834800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac6000 r8:8483482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834800 r8:8027f5e8 r7:dfc41e60 r6:848d1780 r5:83ac6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc61fb0 to 0xdfc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791f40 INFO: task kworker/1:37:3240 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9932d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:38:3241 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:38 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc65d84 r8:00000002 r7:60000113 r6:dfc65d8c r5:83ac6c00 r4:83ac6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589fb8c r4:8589f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589fb8c r4:84834880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac6c00 r8:848348ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834880 r8:8027f5e8 r7:dfc41e60 r6:848d1800 r5:83ac6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc65fb0 to 0xdfc65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84791f00 INFO: task kworker/1:38:3241 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9932d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:39:3245 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:39 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc81d84 r8:00000002 r7:60000113 r6:dfc81d8c r5:83ac0c00 r4:83ac0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc59000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589f38c r4:8589f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589f38c r4:84834900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac0c00 r8:8483492c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834900 r8:8027f5e8 r7:dfc65e60 r6:848d1880 r5:83ac0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc81fb0 to 0xdfc81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b100 INFO: task kworker/1:39:3245 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 99d86000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:40:3247 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:40 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc85d84 r8:00000002 r7:60000113 r6:dfc85d8c r5:83ac3c00 r4:83ac3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc85e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582d8c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc67000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589f78c r4:8589f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589f78c r4:84834980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac3c00 r8:848349ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834980 r8:8027f5e8 r7:dfc65e60 r6:848d1900 r5:83ac3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc85fb0 to 0xdfc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b100 INFO: task kworker/1:40:3247 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9a116000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:41:3248 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:41 state:D stack:0 pid:3248 tgid:3248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:841c6000 r4:841c6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841c6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccdf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592e78c r4:8592e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592e78c r4:84834a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841c6000 r8:84834a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834a00 r8:8027f5e8 r7:dfc65e60 r6:848d1980 r5:841c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b1c0 INFO: task kworker/1:41:3248 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9a116000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:42:3249 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:42 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc71d84 r8:00000002 r7:60000113 r6:dfc71d8c r5:848fd400 r4:848fd400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fd400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc71e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582da40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc7b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8589ff8c r4:8589fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8589ff8c r4:84834a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fd400 r8:84834aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834a80 r8:8027f5e8 r7:dfc89e60 r6:84834b00 r5:848fd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b140 INFO: task kworker/1:42:3249 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9accb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:43:3252 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:43 state:D stack:0 pid:3252 tgid:3252 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc4dd84 r8:00000002 r7:60000013 r6:dfc4dd8c r5:848fec00 r4:848fec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582db40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc81000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592c38c r4:8592c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592c38c r4:84834b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fec00 r8:84834bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834b80 r8:8027f5e8 r7:dfc89e60 r6:84834c00 r5:848fec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b340 INFO: task kworker/1:43:3252 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9accb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:44:3253 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:44 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc55d84 r8:00000002 r7:60000113 r6:dfc55d8c r5:848fe000 r4:848fe000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848fe000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc55e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582dc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848fe000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592c78c r4:8592c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592c78c r4:84834c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848fe000 r8:84834cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834c80 r8:8027f5e8 r7:dfc89e60 r6:84834d00 r5:848fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc55fb0 to 0xdfc55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b340 INFO: task kworker/1:44:3253 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9b385000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:45:3257 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:45 state:D stack:0 pid:3257 tgid:3257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc9dd84 r8:00000002 r7:60000113 r6:dfc9dd8c r5:84a28000 r4:84a28000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a28000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc9de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8582dd80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a28000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecc95000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592cb8c r4:8592c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592cb8c r4:84834d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28000 r8:84834dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834d80 r8:8027f5e8 r7:dfc89e60 r6:84834e00 r5:84a28000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc9dfb0 to 0xdfc9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b800 INFO: task kworker/1:45:3257 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9bb5b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:46:3258 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:46 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcb1d84 r8:00000002 r7:60000113 r6:dfcb1d8c r5:84a28c00 r4:84a28c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a28c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a28c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecce5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592eb8c r4:8592e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592eb8c r4:84834e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a28c00 r8:84834eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834e80 r8:8027f5e8 r7:dfc89e60 r6:84834f00 r5:84a28c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcb1fb0 to 0xdfcb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497b800 INFO: task kworker/1:46:3258 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9bb5b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:47:3259 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:47 state:D stack:0 pid:3259 tgid:3259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:df98dd84 r8:00000002 r7:60000113 r6:df98dd8c r5:84a29800 r4:84a29800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a29800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df98de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3200 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a29800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccd1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592e38c r4:8592e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592e38c r4:84834f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a29800 r8:84834fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84834f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84834f80 r8:8027f5e8 r7:dfc89e60 r6:83ae0000 r5:84a29800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf98dfb0 to 0xdf98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497bb80 INFO: task kworker/1:47:3259 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9c420000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:48:3263 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:48 state:D stack:0 pid:3263 tgid:3263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfab1d84 r8:00000002 r7:60000113 r6:dfab1d8c r5:84a82400 r4:84a82400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a82400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a82400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecccb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592df8c r4:8592dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592df8c r4:83ae0080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a82400 r8:83ae00ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0080 r8:8027f5e8 r7:dfc89e60 r6:848d1a00 r5:84a82400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab1fb0 to 0xdfab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497bb80 INFO: task kworker/1:48:3263 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9c998000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:49:3264 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:49 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcbdd84 r8:00000002 r7:60000113 r6:dfcbdd8c r5:84a83000 r4:84a83000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a83000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcbde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a83000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccbd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592db8c r4:8592d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592db8c r4:83ae0100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a83000 r8:83ae012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0100 r8:8027f5e8 r7:dfab1e60 r6:848d1a80 r5:84a83000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcbdfb0 to 0xdfcbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497bcc0 INFO: task kworker/1:49:3264 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9cecf000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:50:3265 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:50 state:D stack:0 pid:3265 tgid:3265 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcc1d84 r8:00000002 r7:60000113 r6:dfcc1d8c r5:84a83c00 r4:84a83c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a83c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ea340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecca9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592d38c r4:8592d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592d38c r4:83ae0180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a83c00 r8:83ae01ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0180 r8:8027f5e8 r7:dfcbde60 r6:848d1b00 r5:84a83c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc1fb0 to 0xdfcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497bcc0 INFO: task kworker/1:50:3265 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9cfdc000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:51:3268 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:51 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcc9d84 r8:00000002 r7:60000113 r6:dfcc9d8c r5:84a85400 r4:84a85400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a85400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85855e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a85400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccb7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592d78c r4:8592d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592d78c r4:83ae0200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a85400 r8:83ae022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0200 r8:8027f5e8 r7:dfcc1e60 r6:848d1b80 r5:84a85400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc9fb0 to 0xdfcc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497bdc0 INFO: task kworker/1:51:3268 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9d381000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:52:3270 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:52 state:D stack:0 pid:3270 tgid:3270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfccdd84 r8:00000002 r7:60000113 r6:dfccdd8c r5:84a80000 r4:84a80000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a80000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfccde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a80000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592f38c r4:8592f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592f38c r4:83ae0280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a80000 r8:83ae02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0280 r8:8027f5e8 r7:dfcc1e60 r6:848d1c00 r5:84a80000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfccdfb0 to 0xdfccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848935c0 INFO: task kworker/1:52:3270 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9d381000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:53:3272 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:53 state:D stack:0 pid:3272 tgid:3272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcd1d84 r8:00000002 r7:60000113 r6:dfcd1d8c r5:84a86000 r4:84a86000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a86000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a86000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eccf3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592ef8c r4:8592ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592ef8c r4:83ae0300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a86000 r8:83ae032c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0300 r8:8027f5e8 r7:dfccde60 r6:848d1c80 r5:84a86000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd1fb0 to 0xdfcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a200 INFO: task kworker/1:53:3272 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9d696000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:54:3274 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:54 state:D stack:0 pid:3274 tgid:3274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcd5d84 r8:00000002 r7:60000113 r6:dfcd5d8c r5:84a86c00 r4:84a86c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a86c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a86c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd0d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592fb8c r4:8592f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592fb8c r4:83ae0380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a86c00 r8:83ae03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0380 r8:8027f5e8 r7:dfccde60 r6:848d1d00 r5:84a86c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcd5fb0 to 0xdfcd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a180 INFO: task kworker/1:54:3274 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9d922000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:55:3276 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:55 state:D stack:0 pid:3276 tgid:3276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcddd84 r8:00000002 r7:60000113 r6:dfcddd8c r5:84a80c00 r4:84a80c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a80c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcdde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd07000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592f78c r4:8592f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592f78c r4:83ae0400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a80c00 r8:83ae042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0400 r8:8027f5e8 r7:dfcd5e60 r6:848d1d80 r5:84a80c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcddfb0 to 0xdfcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a340 INFO: task kworker/1:55:3276 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9dbe4000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:56:3277 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:56 state:D stack:0 pid:3277 tgid:3277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfce1d84 r8:00000002 r7:60000113 r6:dfce1d8c r5:84a81800 r4:84a81800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a81800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a81800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd1b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8592ff8c r4:8592fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8592ff8c r4:83ae0480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a81800 r8:83ae04ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0480 r8:8027f5e8 r7:dfcd5e60 r6:848d1e00 r5:84a81800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce1fb0 to 0xdfce1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a340 INFO: task kworker/1:56:3277 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9de60000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:57:3279 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:57 state:D stack:0 pid:3279 tgid:3279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfce9d84 r8:00000002 r7:60000013 r6:dfce9d8c r5:849e8000 r4:849e8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfce9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd43000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85930f8c r4:85930c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85930f8c r4:83ae0500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e8000 r8:83ae052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0500 r8:8027f5e8 r7:dfce1e60 r6:848d1e80 r5:849e8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfce9fb0 to 0xdfce9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a680 INFO: task kworker/1:57:3279 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9e720000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:58:3281 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:58 state:D stack:0 pid:3281 tgid:3281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcf1d84 r8:00000002 r7:60000013 r6:dfcf1d8c r5:849e9800 r4:849e9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849e9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd21000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593038c r4:85930000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593038c r4:83ae0580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e9800 r8:83ae05ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0580 r8:8027f5e8 r7:dfce9e60 r6:848d1f00 r5:849e9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf1fb0 to 0xdfcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a580 INFO: task kworker/1:58:3281 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9e720000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:59:3284 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:59 state:D stack:0 pid:3284 tgid:3284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcf5d84 r8:00000002 r7:60000113 r6:dfcf5d8c r5:849ea400 r4:849ea400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ea400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856d3b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecd2f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593078c r4:85930400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593078c r4:83ae0600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ea400 r8:83ae062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0600 r8:8027f5e8 r7:dfce9e60 r6:848d1f80 r5:849ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf5fb0 to 0xdfcf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a800 INFO: task kworker/1:59:3284 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9ea75000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:60:3286 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:60 state:D stack:0 pid:3286 tgid:3286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:84a2c800 r4:84a2c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593238c r4:85932000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593238c r4:83ae0680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2c800 r8:83ae06ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0680 r8:8027f5e8 r7:dfce9e60 r6:83ae0700 r5:84a2c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487a9c0 INFO: task kworker/1:60:3286 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9ea75000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:61:3289 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:61 state:D stack:0 pid:3289 tgid:3289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcedd84 r8:00000002 r7:60000113 r6:dfcedd8c r5:84a2a400 r4:84a2a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a2a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb05000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85931b8c r4:85931800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85931b8c r4:83ae0780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2a400 r8:83ae07ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0780 r8:8027f5e8 r7:dfa69e60 r6:83ae0800 r5:84a2a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcedfb0 to 0xdfcedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487ab80 INFO: task kworker/1:61:3289 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9eca0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:62:3290 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:62 state:D stack:0 pid:3290 tgid:3290 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcf9d84 r8:00000002 r7:60000113 r6:dfcf9d8c r5:84a2d400 r4:84a2d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcf9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a2d400 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb137000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85931f8c r4:85931c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85931f8c r4:83ae0880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2d400 r8:83ae08ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0880 r8:8027f5e8 r7:dfcede60 r6:83ae0900 r5:84a2d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcf9fb0 to 0xdfcf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487ab80 INFO: task kworker/1:62:3290 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9f115000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:63:3292 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:63 state:D stack:0 pid:3292 tgid:3292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfca9d84 r8:00000002 r7:60000113 r6:dfca9d8c r5:84a2e000 r4:84a2e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfca9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a2e000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593278c r4:85932400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593278c r4:83ae0980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2e000 r8:83ae09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0980 r8:8027f5e8 r7:dfcede60 r6:83ae0a00 r5:84a2e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfca9fb0 to 0xdfca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487ac40 INFO: task kworker/1:63:3292 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9f440000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:64:3295 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:64 state:D stack:0 pid:3295 tgid:3295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfcfdd84 r8:00000002 r7:60000113 r6:dfcfdd8c r5:84a2bc00 r4:84a2bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcfde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a2bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df87f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593178c r4:85931400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593178c r4:83ae0a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2bc00 r8:83ae0aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0a80 r8:8027f5e8 r7:dfca9e60 r6:83ae0b00 r5:84a2bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcfdfb0 to 0xdfcfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84799700 INFO: task kworker/1:64:3295 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9f4f4000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:65:3297 blocked for more than 452 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:65 state:D stack:0 pid:3297 tgid:3297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd05d84 r8:00000002 r7:60000113 r6:dfd05d8c r5:849d0c00 r4:849d0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd05e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855224c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd13000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85932b8c r4:85932800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85932b8c r4:83ae0b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d0c00 r8:83ae0bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0b80 r8:8027f5e8 r7:dfca9e60 r6:83ae0c00 r5:849d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd05fb0 to 0xdfd05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ed240 INFO: task kworker/1:65:3297 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9fbcb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:66:3299 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:66 state:D stack:0 pid:3299 tgid:3299 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd09d84 r8:00000002 r7:60000113 r6:dfd09d8c r5:849d1800 r4:849d1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd9d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593338c r4:85933000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593338c r4:83ae0c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d1800 r8:83ae0cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0c80 r8:8027f5e8 r7:dfd05e60 r6:83ae0d00 r5:849d1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd09fb0 to 0xdfd09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ed180 INFO: task kworker/1:66:3299 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: 9ff4c000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:67:3301 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:67 state:D stack:0 pid:3301 tgid:3301 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd01d84 r8:00000002 r7:60000113 r6:dfd01d8c r5:849d3000 r4:849d3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd01e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855225c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd69000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85932f8c r4:85932c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85932f8c r4:83ae0d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d3000 r8:83ae0dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0d80 r8:8027f5e8 r7:dfd09e60 r6:83ae0e00 r5:849d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd01fb0 to 0xdfd01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ed4c0 INFO: task kworker/1:67:3301 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a07e8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:68:3302 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:68 state:D stack:0 pid:3302 tgid:3302 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd0dd84 r8:00000002 r7:60000113 r6:dfd0dd8c r5:849d0000 r4:849d0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe3f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85933f8c r4:85933c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85933f8c r4:83ae0e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d0000 r8:83ae0eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0e80 r8:8027f5e8 r7:dfd09e60 r6:83ae0f00 r5:849d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd0dfb0 to 0xdfd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ed600 INFO: task kworker/1:68:3302 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a07e8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:69:3305 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:69 state:D stack:0 pid:3305 tgid:3305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd11d84 r8:00000002 r7:60000113 r6:dfd11d8c r5:849d4800 r4:849d4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdd7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593378c r4:85933400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593378c r4:83ae0f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d4800 r8:83ae0fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:83ae0f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae0f80 r8:8027f5e8 r7:dfd0de60 r6:848ec000 r5:849d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd11fb0 to 0xdfd11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ed880 INFO: task kworker/1:69:3305 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a1304000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:70:3306 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:70 state:D stack:0 pid:3306 tgid:3306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd19d84 r8:00000002 r7:60000113 r6:dfd19d8c r5:849ebc00 r4:849ebc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ebc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855228c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ebc00 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe03000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85933b8c r4:85933800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85933b8c r4:848ee000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ebc00 r8:848ee02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee000 r8:8027f5e8 r7:dfd0de60 r6:848ec080 r5:849ebc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd19fb0 to 0xdfd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ed880 INFO: task kworker/1:70:3306 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a15c0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:71:3309 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:71 state:D stack:0 pid:3309 tgid:3309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd29d84 r8:00000002 r7:60000113 r6:dfd29d8c r5:849ec800 r4:849ec800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ec800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebf4f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593438c r4:85934000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593438c r4:848ee080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ec800 r8:848ee0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee080 r8:8027f5e8 r7:dfd0de60 r6:848ec100 r5:849ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd29fb0 to 0xdfd29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848edb40 INFO: task kworker/1:71:3309 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a1b4b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:72:3311 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:72 state:D stack:0 pid:3311 tgid:3311 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd3dd84 r8:00000002 r7:60000113 r6:dfd3dd8c r5:849ee000 r4:849ee000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ee000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd3de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ee000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593478c r4:85934400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593478c r4:848ee100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ee000 r8:848ee12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee100 r8:8027f5e8 r7:dfd29e60 r6:848ec180 r5:849ee000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd3dfb0 to 0xdfd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848edd40 INFO: task kworker/1:72:3311 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a1b4b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:73:3313 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:73 state:D stack:0 pid:3313 tgid:3313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd4dd84 r8:00000002 r7:60000113 r6:dfd4dd8c r5:849ed400 r4:849ed400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ed400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd4de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec931000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85935b8c r4:85935800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85935b8c r4:848ee180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ed400 r8:848ee1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee180 r8:8027f5e8 r7:dfd3de60 r6:848ec200 r5:849ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd4dfb0 to 0xdfd4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8497fac0 INFO: task kworker/1:73:3313 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a249d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:74:3315 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:74 state:D stack:0 pid:3315 tgid:3315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd51d84 r8:00000002 r7:60000113 r6:dfd51d8c r5:849eec00 r4:849eec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849eec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd51e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec7df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85934b8c r4:85934800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85934b8c r4:848ee200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849eec00 r8:848ee22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee200 r8:8027f5e8 r7:dfd4de60 r6:848ec280 r5:849eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd51fb0 to 0xdfd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848edf40 INFO: task kworker/1:74:3315 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a2626000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:75:3316 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:75 state:D stack:0 pid:3316 tgid:3316 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd59d84 r8:00000002 r7:60000013 r6:dfd59d8c r5:849eb000 r4:849eb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849eb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85522e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8bb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593538c r4:85935000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593538c r4:848ee280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849eb000 r8:848ee2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee280 r8:8027f5e8 r7:dfd4de60 r6:848ec300 r5:849eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd59fb0 to 0xdfd59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490b0c0 INFO: task kworker/1:75:3316 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a3284000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:76:3318 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:76 state:D stack:0 pid:3318 tgid:3318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd65d84 r8:00000002 r7:60000013 r6:dfd65d8c r5:849e8c00 r4:849e8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849e8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857c9440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec919000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593578c r4:85935400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593578c r4:848ee300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849e8c00 r8:848ee32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee300 r8:8027f5e8 r7:dfd4de60 r6:848ec380 r5:849e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd65fb0 to 0xdfd65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490b280 INFO: task kworker/1:76:3318 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a3c5d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:77:3322 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:77 state:D stack:0 pid:3322 tgid:3322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd41d84 r8:00000002 r7:60000113 r6:dfd41d8c r5:841f2400 r4:841f2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:841f2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd41e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841f2400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec94b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85935f8c r4:85935c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85935f8c r4:848ee380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:841f2400 r8:848ee3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee380 r8:8027f5e8 r7:dfd4de60 r6:848ec400 r5:841f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd41fb0 to 0xdfd41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490b440 INFO: task kworker/1:77:3322 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a3c5d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:78:3323 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:78 state:D stack:0 pid:3323 tgid:3323 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfb95d84 r8:00000002 r7:60000113 r6:dfb95d8c r5:84a84800 r4:84a84800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a84800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb95e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a84800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec95f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593638c r4:85936000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593638c r4:848ee400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a84800 r8:848ee42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee400 r8:8027f5e8 r7:dfd41e60 r6:848ec480 r5:84a84800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb95fb0 to 0xdfb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490b440 INFO: task kworker/1:78:3323 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a422a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:79:3326 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:79 state:D stack:0 pid:3326 tgid:3326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:84490000 r4:84490000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84490000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84490000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85936f8c r4:85936c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85936f8c r4:848ee480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84490000 r8:848ee4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee480 r8:8027f5e8 r7:dfb95e60 r6:848ec500 r5:84490000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490b6c0 INFO: task kworker/1:79:3326 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a480e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:80:3327 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:80 state:D stack:0 pid:3327 tgid:3327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbadd84 r8:00000002 r7:60000113 r6:dfbadd8c r5:84490c00 r4:84490c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84490c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84490c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec99f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593678c r4:85936400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593678c r4:848ee500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84490c00 r8:848ee52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee500 r8:8027f5e8 r7:dfba5e60 r6:848ec580 r5:84490c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbadfb0 to 0xdfbadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490b6c0 INFO: task kworker/1:80:3327 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a4cf9000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:81:3329 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:81 state:D stack:0 pid:3329 tgid:3329 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:84491800 r4:84491800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84491800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84491800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca03000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593778c r4:85937400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593778c r4:848ee580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84491800 r8:848ee5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee580 r8:8027f5e8 r7:dfba5e60 r6:848ec600 r5:84491800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490b6c0 INFO: task kworker/1:81:3329 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a533f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:82:3332 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:82 state:D stack:0 pid:3332 tgid:3332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd15d84 r8:00000002 r7:60000113 r6:dfd15d8c r5:84492400 r4:84492400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84492400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd15e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b5c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84492400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec9d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593738c r4:85937000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593738c r4:848ee600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84492400 r8:848ee62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee600 r8:8027f5e8 r7:dfbc5e60 r6:848ec680 r5:84492400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd15fb0 to 0xdfd15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490ba40 INFO: task kworker/1:82:3332 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a5712000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:83:3336 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:83 state:D stack:0 pid:3336 tgid:3336 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc69d84 r8:00000002 r7:60000113 r6:dfc69d8c r5:84495400 r4:84495400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84495400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84495400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca17000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85937b8c r4:85937800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85937b8c r4:848ee680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84495400 r8:848ee6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee680 r8:8027f5e8 r7:dfbc5e60 r6:848ec800 r5:84495400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc69fb0 to 0xdfc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490bd80 INFO: task kworker/1:83:3336 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a5712000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:84:3338 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:84 state:D stack:0 pid:3338 tgid:3338 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd6dd84 r8:00000002 r7:60000113 r6:dfd6dd8c r5:84496000 r4:84496000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84496000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd6de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541bfc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84496000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb5b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85939b8c r4:85939800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85939b8c r4:848ee700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84496000 r8:848ee72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee700 r8:8027f5e8 r7:dfc69e60 r6:848ec880 r5:84496000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd6dfb0 to 0xdfd6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490bd40 INFO: task kworker/1:84:3338 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a58b3000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:85:3339 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:85 state:D stack:0 pid:3339 tgid:3339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd71d84 r8:00000002 r7:60000113 r6:dfd71d8c r5:84496c00 r4:84496c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84496c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd71e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84496c00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca35000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85937f8c r4:85937c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85937f8c r4:848ee780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84496c00 r8:848ee7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee780 r8:8027f5e8 r7:dfd6de60 r6:848ec900 r5:84496c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd71fb0 to 0xdfd71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490bd40 INFO: task kworker/1:85:3339 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a59d0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:86:3341 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:86 state:D stack:0 pid:3341 tgid:3341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd7dd84 r8:00000002 r7:60000113 r6:dfd7dd8c r5:84390000 r4:84390000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84390000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd7de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541b980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84390000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eca49000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593838c r4:85938000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593838c r4:848ee800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84390000 r8:848ee82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee800 r8:8027f5e8 r7:dfd6de60 r6:848ec980 r5:84390000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd7dfb0 to 0xdfd7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490bf00 INFO: task kworker/1:86:3341 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a5be4000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:87:3343 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:87 state:D stack:0 pid:3343 tgid:3343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd81d84 r8:00000002 r7:60000113 r6:dfd81d8c r5:84390c00 r4:84390c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84390c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd81e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541bac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84390c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdc3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593878c r4:85938400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593878c r4:848ee880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84390c00 r8:848ee8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee880 r8:8027f5e8 r7:dfd6de60 r6:848eca00 r5:84390c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd81fb0 to 0xdfd81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490bfc0 INFO: task kworker/1:87:3343 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a5d70000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:88:3345 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:88 state:D stack:0 pid:3345 tgid:3345 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd89d84 r8:00000002 r7:60000113 r6:dfd89d8c r5:84392400 r4:84392400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84392400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd89e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541bdc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84392400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecddd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593938c r4:85939000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593938c r4:848ee900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84392400 r8:848ee92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee900 r8:8027f5e8 r7:dfd6de60 r6:848eca80 r5:84392400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd89fb0 to 0xdfd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490d0c0 INFO: task kworker/1:88:3345 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a62a0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:89:3347 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:89 state:D stack:0 pid:3347 tgid:3347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd25d84 r8:00000002 r7:60000113 r6:dfd25d8c r5:849d3c00 r4:849d3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd25e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8541bd00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdd7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85938f8c r4:85938c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85938f8c r4:848ee980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d3c00 r8:848ee9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848ee980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848ee980 r8:8027f5e8 r7:dfd6de60 r6:848eea00 r5:849d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd25fb0 to 0xdfd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490d180 INFO: task kworker/1:89:3347 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a62a0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:90:3350 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:90 state:D stack:0 pid:3350 tgid:3350 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd8dd84 r8:00000002 r7:60000113 r6:dfd8dd8c r5:849d6000 r4:849d6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd8de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85838d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593a38c r4:8593a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593a38c r4:848eea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d6000 r8:848eeaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848eea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848eea80 r8:8027f5e8 r7:dfd6de60 r6:848eeb00 r5:849d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd8dfb0 to 0xdfd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490d380 INFO: task kworker/1:90:3350 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a647f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:91:3351 blocked for more than 453 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:91 state:D stack:0 pid:3351 tgid:3351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd99d84 r8:00000002 r7:60000113 r6:dfd99d8c r5:84391800 r4:84391800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84391800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd99e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849171c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84391800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb87000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85939f8c r4:85939c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85939f8c r4:848eeb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84391800 r8:848eebac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848eeb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848eeb80 r8:8027f5e8 r7:dfd8de60 r6:848ecb00 r5:84391800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd99fb0 to 0xdfd99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490d380 INFO: task kworker/1:91:3351 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a67bb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:92:3354 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:92 state:D stack:0 pid:3354 tgid:3354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfda5d84 r8:00000002 r7:60000113 r6:dfda5d8c r5:84393c00 r4:84393c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84393c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cde00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84393c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb231000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593a78c r4:8593a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593a78c r4:848eec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84393c00 r8:848eec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848eec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848eec00 r8:8027f5e8 r7:dfd8de60 r6:848ecb80 r5:84393c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda5fb0 to 0xdfda5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490d640 INFO: task kworker/1:92:3354 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a6a1d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:93:3355 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:93 state:D stack:0 pid:3355 tgid:3355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfda9d84 r8:00000002 r7:60000113 r6:dfda9d8c r5:84394800 r4:84394800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84394800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfda9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ea3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84394800 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb58f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593ab8c r4:8593a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593ab8c r4:848eec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84394800 r8:848eecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848eec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848eec80 r8:8027f5e8 r7:dfda5e60 r6:848ecc00 r5:84394800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfda9fb0 to 0xdfda9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490d640 INFO: task kworker/1:93:3355 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a6a1d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:95:3359 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:95 state:D stack:0 pid:3359 tgid:3359 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc7dd84 r8:00000002 r7:60000113 r6:dfc7dd8c r5:84395400 r4:84395400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84395400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc7de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ea9c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84395400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba0b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593b78c r4:8593b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593b78c r4:848eed80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84395400 r8:848eedac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848eed80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848eed80 r8:8027f5e8 r7:dfdb1e60 r6:848ecd00 r5:84395400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc7dfb0 to 0xdfc7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490db40 INFO: task kworker/1:95:3359 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a6c9a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:96:3361 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:96 state:D stack:0 pid:3361 tgid:3361 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfd95d84 r8:00000002 r7:60000113 r6:dfd95d8c r5:849d6c00 r4:849d6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfd95e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eab40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593bb8c r4:8593b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593bb8c r4:848eee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d6c00 r8:848eee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848eee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848eee00 r8:8027f5e8 r7:dfdb1e60 r6:848eee80 r5:849d6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfd95fb0 to 0xdfd95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490dac0 INFO: task kworker/1:96:3361 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a6e3e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:97:3364 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:97 state:D stack:0 pid:3364 tgid:3364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfdb9d84 r8:00000002 r7:60000113 r6:dfdb9d8c r5:849d5400 r4:849d5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdb9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eaf80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc91000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8593bf8c r4:8593bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8593bf8c r4:848eef00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d5400 r8:848eef2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848eef00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848eef00 r8:8027f5e8 r7:dfdb1e60 r6:848eef80 r5:849d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdb9fb0 to 0xdfdb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490de80 INFO: task kworker/1:97:3364 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a7220000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:98:3365 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:98 state:D stack:0 pid:3365 tgid:3365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfc29d84 r8:00000002 r7:60000113 r6:dfc29d8c r5:849d2400 r4:849d2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849d2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857ea940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ed000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcd7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450c38c r4:8450c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8450c38c r4:84a7c000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849d2400 r8:84a7c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7c000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7c000 r8:8027f5e8 r7:dfdb1e60 r6:84a7c080 r5:849d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490dd00 INFO: task kworker/1:98:3365 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a7220000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:99:3368 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:99 state:D stack:0 pid:3368 tgid:3368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:dfdc5d84 r8:00000002 r7:60000113 r6:dfdc5d8c r5:84a2ec00 r4:84a2ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a2ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfdc5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:857eaf00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a2ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ef000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450d38c r4:8450d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8450d38c r4:84a7c100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a2ec00 r8:84a7c12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a7c100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7c100 r8:8027f5e8 r7:dfdb1e60 r6:84a7c180 r5:84a2ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfdc5fb0 to 0xdfdc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848efdc0 INFO: task kworker/1:99:3368 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a75df000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3766 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3766 tgid:3766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e05c1d84 r8:00000002 r7:60000013 r6:e05c1d8c r5:84483000 r4:84483000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84483000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05c1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85004040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84483000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa43000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb078c r4:84bb0400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb078c r4:84be0580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84483000 r8:84be05ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be0580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0580 r8:8027f5e8 r7:e05bde60 r6:84be0600 r5:84483000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05c1fb0 to 0xe05c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a8c540 INFO: task kworker/0:60:3766 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a75df000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:68:3783 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:68 state:D stack:0 pid:3783 tgid:3783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e01e5d84 r8:00000002 r7:60000113 r6:e01e5d8c r5:85020c00 r4:85020c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85020c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01e5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85004200 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85020c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0f8c r4:84bb0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb0f8c r4:84be0d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85020c00 r8:84be0dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be0d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0d80 r8:8027f5e8 r7:e05d5e60 r6:84be0e00 r5:85020c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01e5fb0 to 0xe01e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bed280 INFO: task kworker/0:68:3783 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a7a2a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:69:3816 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:69 state:D stack:0 pid:3816 tgid:3816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e061dd84 r8:00000002 r7:60000113 r6:e061dd8c r5:84b78c00 r4:84b78c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b78c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85004140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b78c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa95000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb0b8c r4:84bb0800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb0b8c r4:84be0f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b78c00 r8:84be0fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be0f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be0f80 r8:8027f5e8 r7:e01e5e60 r6:8494cc00 r5:84b78c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe061dfb0 to 0xe061dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a93ac0 INFO: task kworker/0:69:3816 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a7a2a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:288:3824 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:288 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0631d84 r8:00000002 r7:60000013 r6:e0631d8c r5:84b7bc00 r4:84b7bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b7bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0631e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 INFO: task kworker/1:288:3824 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a7ca0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:3828 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0639d84 r8:00000002 r7:60000113 r6:e0639d8c r5:84b7d400 r4:84b7d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b7d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 INFO: task kworker/1:290:3828 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a80b2000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:3831 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:291 state:D stack:0 pid:3831 tgid:3831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e063dd84 r8:00000002 r7:60000113 r6:e063dd8c r5:84b7e000 r4:84b7e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b7e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7e000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0281000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436578c r4:84365400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436578c r4:84be5280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7e000 r8:84be52ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5280 r8:8027f5e8 r7:e0639e60 r6:84be5300 r5:84b7e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe063dfb0 to 0xe063dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be44c0 INFO: task kworker/1:291:3831 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a81ba000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:292:3832 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:292 state:D stack:0 pid:3832 tgid:3832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0641d84 r8:00000002 r7:60000013 r6:e0641d8c r5:84b7ec00 r4:84b7ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b7ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e020f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364f8c r4:84364c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364f8c r4:84be5380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7ec00 r8:84be53ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5380 r8:8027f5e8 r7:e063de60 r6:84be5400 r5:84b7ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0641fb0 to 0xe0641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be44c0 INFO: task kworker/1:292:3832 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a856a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:3833 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:3833 tgid:3833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0649d84 r8:00000002 r7:60000113 r6:e0649d8c r5:84b80000 r4:84b80000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b80000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b80000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0227000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436538c r4:84365000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436538c r4:84be5480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b80000 r8:84be54ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5480 r8:8027f5e8 r7:e063de60 r6:84be5500 r5:84b80000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0649fb0 to 0xe0649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be44c0 INFO: task kworker/1:293:3833 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a8599000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:3836 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:294 state:D stack:0 pid:3836 tgid:3836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0645d84 r8:00000002 r7:60000113 r6:e0645d8c r5:84b80c00 r4:84b80c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b80c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0645e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b80c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0657000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84365b8c r4:84365800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84365b8c r4:84be5580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b80c00 r8:84be55ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5580 r8:8027f5e8 r7:e063de60 r6:84be5600 r5:84b80c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0645fb0 to 0xe0645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be48c0 INFO: task kworker/1:294:3836 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a8816000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:295:3838 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:3838 tgid:3838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0655d84 r8:00000002 r7:60000113 r6:e0655d8c r5:84b81800 r4:84b81800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b81800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0655e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b81800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84365f8c r4:84365c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84365f8c r4:84be5680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b81800 r8:84be56ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5680 r8:8027f5e8 r7:e0645e60 r6:84be5700 r5:84b81800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0655fb0 to 0xe0655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4980 INFO: task kworker/1:295:3838 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a8bc6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:3840 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:3840 tgid:3840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0661d84 r8:00000002 r7:60000113 r6:e0661d8c r5:84b82400 r4:84b82400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b82400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0661e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b82400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436638c r4:84366000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436638c r4:84be5780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b82400 r8:84be57ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5780 r8:8027f5e8 r7:e0655e60 r6:84be5800 r5:84b82400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0661fb0 to 0xe0661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4ac0 INFO: task kworker/1:296:3840 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a8e8a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:297:3842 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:297 state:D stack:0 pid:3842 tgid:3842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e064dd84 r8:00000002 r7:60000013 r6:e064dd8c r5:84b83c00 r4:84b83c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b83c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a89f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b83c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0671000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436678c r4:84366400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436678c r4:84be5880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b83c00 r8:84be58ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5880 r8:8027f5e8 r7:e0661e60 r6:84be5900 r5:84b83c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe064dfb0 to 0xe064dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4d00 INFO: task kworker/1:297:3842 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a8fed000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:3844 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:3844 tgid:3844 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0669d84 r8:00000002 r7:60000113 r6:e0669d8c r5:84b84800 r4:84b84800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b84800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0669e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfa000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b84800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e067b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84366b8c r4:84366800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84366b8c r4:84be5a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b84800 r8:84be5a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5a00 r8:8027f5e8 r7:e064de60 r6:84be5a80 r5:84b84800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0669fb0 to 0xe0669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bfa080 INFO: task kworker/1:298:3844 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a91b8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:299:3846 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:299 state:D stack:0 pid:3846 tgid:3846 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0679d84 r8:00000002 r7:60000113 r6:e0679d8c r5:84b85400 r4:84b85400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b85400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0679e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfa1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b85400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0681000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84366f8c r4:84366c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84366f8c r4:84be5980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b85400 r8:84be59ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5980 r8:8027f5e8 r7:e0669e60 r6:84be5b00 r5:84b85400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0679fb0 to 0xe0679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bfa300 INFO: task kworker/1:299:3846 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a93f4000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:70:3852 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:70 state:D stack:0 pid:3852 tgid:3852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0695d84 r8:00000002 r7:60000113 r6:e0695d8c r5:84b86000 r4:84b86000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b86000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0695e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85004440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b86000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd1b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb178c r4:84bb1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb178c r4:85005000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b86000 r8:8500502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005000 r8:8027f5e8 r7:e01e5e60 r6:84be5b80 r5:84b86000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0695fb0 to 0xe0695ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85004240 INFO: task kworker/0:70:3852 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a964f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:71:3853 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:71 state:D stack:0 pid:3853 tgid:3853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0699d84 r8:00000002 r7:60000013 r6:e0699d8c r5:84b86c00 r4:84b86c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b86c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0699e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85004380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b86c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb138c r4:84bb1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb138c r4:85005080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b86c00 r8:850050ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005080 r8:8027f5e8 r7:e0695e60 r6:84be5c00 r5:84b86c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0699fb0 to 0xe0699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850044c0 INFO: task kworker/0:71:3853 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a97db000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:72:3856 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:72 state:D stack:0 pid:3856 tgid:3856 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06a1d84 r8:00000002 r7:60000113 r6:e06a1d8c r5:84b88c00 r4:84b88c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b88c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850047c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1f8c r4:84bb1c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb1f8c r4:85005100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b88c00 r8:8500512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005100 r8:8027f5e8 r7:e0695e60 r6:84be5c80 r5:84b88c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a1fb0 to 0xe06a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85004480 INFO: task kworker/0:72:3856 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a998e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:73:3857 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:73 state:D stack:0 pid:3857 tgid:3857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06a5d84 r8:00000002 r7:60000113 r6:e06a5d8c r5:84b89800 r4:84b89800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b89800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850046c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b89800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb1b8c r4:84bb1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb1b8c r4:85005180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b89800 r8:850051ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005180 r8:8027f5e8 r7:e06a1e60 r6:84be5d00 r5:84b89800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a5fb0 to 0xe06a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85004580 INFO: task kworker/0:73:3857 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a9cac000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:300:3858 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:300 state:D stack:0 pid:3858 tgid:3858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06a9d84 r8:00000002 r7:60000113 r6:e06a9d8c r5:84b8a400 r4:84b8a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c9940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8a400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffd5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505838c r4:85058000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8505838c r4:84be5d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8a400 r8:84be5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5d80 r8:8027f5e8 r7:e0679e60 r6:84be5e00 r5:84b8a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a9fb0 to 0xe06a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bfa8c0 INFO: task kworker/1:300:3858 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: a9f0f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:3859 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:3859 tgid:3859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06add84 r8:00000002 r7:60000113 r6:e06add8c r5:84b8b000 r4:84b8b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfa380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8b000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436738c r4:84367000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436738c r4:84be5e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8b000 r8:84be5eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5e80 r8:8027f5e8 r7:e06a9e60 r6:84be5f00 r5:84b8b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06adfb0 to 0xe06adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bfa8c0 INFO: task kworker/1:301:3859 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: aa0db000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:302:3861 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:302 state:D stack:0 pid:3861 tgid:3861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06c9d84 r8:00000002 r7:60000113 r6:e06c9d8c r5:84b8bc00 r4:84b8bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84895040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0223000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436778c r4:84367400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436778c r4:84be5f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8bc00 r8:84be5fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5f80 r8:8027f5e8 r7:e06a9e60 r6:84bf3000 r5:84b8bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c9fb0 to 0xe06c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bfa8c0 INFO: task kworker/1:302:3861 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: aa446000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:74:3863 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:74 state:D stack:0 pid:3863 tgid:3863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06d5d84 r8:00000002 r7:60000113 r6:e06d5d8c r5:84b8d400 r4:84b8d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85004a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b8d400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeb3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb278c r4:84bb2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb278c r4:85005200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8d400 r8:8500522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005200 r8:8027f5e8 r7:e06a1e60 r6:84bf3080 r5:84b8d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d5fb0 to 0xe06d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850049c0 INFO: task kworker/0:74:3863 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: aa639000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:75:3865 blocked for more than 454 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:75 state:D stack:0 pid:3865 tgid:3865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0239d84 r8:00000002 r7:60000113 r6:e0239d8c r5:85024800 r4:85024800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85024800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0239e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85004840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85024800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe91000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb238c r4:84bb2000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb238c r4:85005280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85024800 r8:850052ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005280 r8:8027f5e8 r7:e06d5e60 r6:85005300 r5:85024800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0239fb0 to 0xe0239ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850049c0 INFO: task kworker/0:75:3865 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: aa906000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:76:3867 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:76 state:D stack:0 pid:3867 tgid:3867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06cdd84 r8:00000002 r7:60000013 r6:e06cdd8c r5:85026c00 r4:85026c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85026c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a8c440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85026c00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff39000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb378c r4:84bb3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb378c r4:85005380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85026c00 r8:850053ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005380 r8:8027f5e8 r7:e06d5e60 r6:85005400 r5:85026c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85004a00 INFO: task kworker/0:76:3867 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: aac0b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:77:3868 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:77 state:D stack:0 pid:3868 tgid:3868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0685d84 r8:00000002 r7:60000013 r6:e0685d8c r5:85025400 r4:85025400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85025400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0685e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85004c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85025400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb2b8c r4:84bb2800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb2b8c r4:85005480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85025400 r8:850054ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005480 r8:8027f5e8 r7:e06cde60 r6:85005500 r5:85025400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0685fb0 to 0xe0685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85004a00 INFO: task kworker/0:77:3868 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: aaf25000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:78:3871 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:78 state:D stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06ddd84 r8:00000002 r7:60000013 r6:e06ddd8c r5:85026000 r4:85026000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85026000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85004d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85026000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfeef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb2f8c r4:84bb2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb2f8c r4:85005580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85026000 r8:850055ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005580 r8:8027f5e8 r7:e06cde60 r6:85005600 r5:85026000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06ddfb0 to 0xe06ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85004cc0 INFO: task kworker/0:78:3871 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ab1fb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:79:3872 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:79 state:D stack:0 pid:3872 tgid:3872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06e1d84 r8:00000002 r7:60000113 r6:e06e1d8c r5:85022400 r4:85022400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85022400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85004e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85022400 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff1b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb338c r4:84bb3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb338c r4:85005680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85022400 r8:850056ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005680 r8:8027f5e8 r7:e06cde60 r6:85005700 r5:85022400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e1fb0 to 0xe06e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85004cc0 INFO: task kworker/0:79:3872 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ab1fb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:80:3875 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:80 state:D stack:0 pid:3875 tgid:3875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06e5d84 r8:00000002 r7:60000113 r6:e06e5d8c r5:85023c00 r4:85023c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85023c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beb040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85023c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0123000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb3b8c r4:84bb3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb3b8c r4:85005780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85023c00 r8:850057ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005780 r8:8027f5e8 r7:e06cde60 r6:85005800 r5:85023c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e5fb0 to 0xe06e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a8c400 INFO: task kworker/0:80:3875 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ab650000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:81:3877 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:81 state:D stack:0 pid:3877 tgid:3877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06edd84 r8:00000002 r7:60000013 r6:e06edd8c r5:844d8000 r4:844d8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06ede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beb1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0137000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bb3f8c r4:84bb3c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bb3f8c r4:85005880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d8000 r8:850058ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005880 r8:8027f5e8 r7:e06e5e60 r6:85005900 r5:844d8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06edfb0 to 0xe06edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84beb080 INFO: task kworker/0:81:3877 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ab6df000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:82:3879 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:82 state:D stack:0 pid:3879 tgid:3879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e071dd84 r8:00000002 r7:60000013 r6:e071dd8c r5:84b8e000 r4:84b8e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e071de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beb480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b8e000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0161000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbc38c r4:84bbc000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbc38c r4:85005980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8e000 r8:850059ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005980 r8:8027f5e8 r7:e06ede60 r6:84bf3100 r5:84b8e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe071dfb0 to 0xe071dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84beb400 INFO: task kworker/0:82:3879 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: abab7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:83:3880 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:83 state:D stack:0 pid:3880 tgid:3880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0709d84 r8:00000002 r7:60000113 r6:e0709d8c r5:844d8c00 r4:844d8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0709e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beb2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e014d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84baa38c r4:84baa000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84baa38c r4:85005a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d8c00 r8:85005a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005a00 r8:8027f5e8 r7:e071de60 r6:85005a80 r5:844d8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0709fb0 to 0xe0709ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84beb400 INFO: task kworker/0:83:3880 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: abcf7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:84:3882 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:84 state:D stack:0 pid:3882 tgid:3882 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0729d84 r8:00000002 r7:60000113 r6:e0729d8c r5:844da400 r4:844da400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844da400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beb7c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844da400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e022d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbc78c r4:84bbc400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbc78c r4:85005b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844da400 r8:85005b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005b00 r8:8027f5e8 r7:e071de60 r6:85005b80 r5:844da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0729fb0 to 0xe0729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84beb440 INFO: task kworker/0:84:3882 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: abcf7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:85:3884 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:85 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0739d84 r8:00000002 r7:60000013 r6:e0739d8c r5:844dbc00 r4:844dbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844dbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0739e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bebac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0265000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbcf8c r4:84bbcc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbcf8c r4:85005c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dbc00 r8:85005c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005c00 r8:8027f5e8 r7:e0729e60 r6:85005c80 r5:844dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0739fb0 to 0xe0739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84beb640 INFO: task kworker/0:85:3884 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ac04d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:86:3887 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:86 state:D stack:0 pid:3887 tgid:3887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e074dd84 r8:00000002 r7:60000013 r6:e074dd8c r5:844db000 r4:844db000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844db000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e074de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beb940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844db000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e024b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbcb8c r4:84bbc800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbcb8c r4:85005d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844db000 r8:85005d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005d00 r8:8027f5e8 r7:e0739e60 r6:85005d80 r5:844db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe074dfb0 to 0xe074dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84beb440 INFO: task kworker/0:86:3887 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ac3a7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:303:3890 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:303 state:D stack:0 pid:3890 tgid:3890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e070dd84 r8:00000002 r7:60000113 r6:e070dd8c r5:84b8c800 r4:84b8c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e070de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bebc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8c800 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e059f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbd38c r4:84bbd000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbd38c r4:84bf3180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8c800 r8:84bf31ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf3180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf3180 r8:8027f5e8 r7:e06a9e60 r6:84bf3200 r5:84b8c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe070dfb0 to 0xe070dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84895080 INFO: task kworker/1:303:3890 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ac560000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:87:3891 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:87 state:D stack:0 pid:3891 tgid:3891 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0751d84 r8:00000002 r7:60000013 r6:e0751d8c r5:84b8ec00 r4:84b8ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b8ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bebf00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b8ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e070f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbdb8c r4:84bbd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbdb8c r4:85005e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b8ec00 r8:85005e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005e00 r8:8027f5e8 r7:e0739e60 r6:84bf3280 r5:84b8ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0751fb0 to 0xe0751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84beb900 INFO: task kworker/0:87:3891 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ac7db000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:88:3892 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:88 state:D stack:0 pid:3892 tgid:3892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0755d84 r8:00000002 r7:60000013 r6:e0755d8c r5:84b88000 r4:84b88000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b88000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0755e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bebe40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b88000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbd78c r4:84bbd400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbd78c r4:85005e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b88000 r8:85005eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005e80 r8:8027f5e8 r7:e0751e60 r6:84bf3300 r5:84b88000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0755fb0 to 0xe0755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bebb40 INFO: task kworker/0:88:3892 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: aca9b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:89:3895 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:89 state:D stack:0 pid:3895 tgid:3895 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e06e9d84 r8:00000002 r7:60000113 r6:e06e9d8c r5:84b83000 r4:84b83000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b83000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84895340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b83000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84367b8c r4:84367800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84367b8c r4:85005f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b83000 r8:85005f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005f00 r8:8027f5e8 r7:e0751e60 r6:84bf3380 r5:84b83000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e9fb0 to 0xe06e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bebe00 INFO: task kworker/0:89:3895 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: acc85000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:90:3899 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:90 state:D stack:0 pid:3899 tgid:3899 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0761d84 r8:00000002 r7:60000113 r6:e0761d8c r5:84b90000 r4:84b90000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b90000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0761e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b90000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0721000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbdf8c r4:84bbdc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbdf8c r4:85005f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b90000 r8:85005fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85005f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85005f80 r8:8027f5e8 r7:e0751e60 r6:84bf3400 r5:84b90000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0761fb0 to 0xe0761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd100 INFO: task kworker/0:90:3899 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: acfa9000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:91:3901 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:91 state:D stack:0 pid:3901 tgid:3901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0769d84 r8:00000002 r7:60000113 r6:e0769d8c r5:84b90c00 r4:84b90c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b90c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0769e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b90c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0743000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbe38c r4:84bbe000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbe38c r4:84bde000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b90c00 r8:84bde02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde000 r8:8027f5e8 r7:e0761e60 r6:84bf3480 r5:84b90c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0769fb0 to 0xe0769ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd380 INFO: task kworker/0:91:3901 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ad179000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:92:3902 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:92 state:D stack:0 pid:3902 tgid:3902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e076dd84 r8:00000002 r7:60000113 r6:e076dd8c r5:84b91800 r4:84b91800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b91800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e076de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b91800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0765000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbe78c r4:84bbe400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbe78c r4:84bde080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b91800 r8:84bde0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde080 r8:8027f5e8 r7:e0769e60 r6:84bf3500 r5:84b91800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe076dfb0 to 0xe076dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd000 INFO: task kworker/0:92:3902 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ad179000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:304:3904 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:304 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0775d84 r8:00000002 r7:60000113 r6:e0775d8c r5:84b92400 r4:84b92400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b92400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0775e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c9840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b92400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc75000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450a38c r4:8450a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8450a38c r4:84bf3580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b92400 r8:84bf35ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf3580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf3580 r8:8027f5e8 r7:e06a9e60 r6:84bf3600 r5:84b92400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0775fb0 to 0xe0775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84895640 INFO: task kworker/1:304:3904 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ad3cf000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:93:3906 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:93 state:D stack:0 pid:3906 tgid:3906 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0781d84 r8:00000002 r7:60000013 r6:e0781d8c r5:84b93000 r4:84b93000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b93000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0781e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b93000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0777000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbeb8c r4:84bbe800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbeb8c r4:84bde100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b93000 r8:84bde12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde100 r8:8027f5e8 r7:e076de60 r6:84bf3a00 r5:84b93000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0781fb0 to 0xe0781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd5c0 INFO: task kworker/0:93:3906 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ad85a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:94:3908 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:94 state:D stack:0 pid:3908 tgid:3908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0795d84 r8:00000002 r7:60000013 r6:e0795d8c r5:84b94800 r4:84b94800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b94800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0795e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b94800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e077d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbef8c r4:84bbec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbef8c r4:84bde180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b94800 r8:84bde1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde180 r8:8027f5e8 r7:e0781e60 r6:84bf3a80 r5:84b94800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0795fb0 to 0xe0795ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd100 INFO: task kworker/0:94:3908 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ad85a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:95:3910 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:95 state:D stack:0 pid:3910 tgid:3910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07a1d84 r8:00000002 r7:60000013 r6:e07a1d8c r5:84b96000 r4:84b96000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b96000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b96000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e078b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbf38c r4:84bbf000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbf38c r4:84bde200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b96000 r8:84bde22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde200 r8:8027f5e8 r7:e0795e60 r6:84bf3b00 r5:84b96000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07a1fb0 to 0xe07a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd600 INFO: task kworker/0:95:3910 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: adbe8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:96:3912 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:96 state:D stack:0 pid:3912 tgid:3912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07b1d84 r8:00000002 r7:60000013 r6:e07b1d8c r5:84b93c00 r4:84b93c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b93c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b93c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0791000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbf78c r4:84bbf400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbf78c r4:84bde280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b93c00 r8:84bde2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde280 r8:8027f5e8 r7:e07a1e60 r6:84bf3b80 r5:84b93c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b1fb0 to 0xe07b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd940 INFO: task kworker/0:96:3912 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ade34000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:97:3913 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:97 state:D stack:0 pid:3913 tgid:3913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0759d84 r8:00000002 r7:60000113 r6:e0759d8c r5:844dd400 r4:844dd400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844dd400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0759e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bddb80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844dd400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbff8c r4:84bbfc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbff8c r4:84bde300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dd400 r8:84bde32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde300 r8:8027f5e8 r7:e07b1e60 r6:84bde380 r5:844dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0759fb0 to 0xe0759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd840 INFO: task kworker/0:97:3913 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: adefd000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:98:3914 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:98 state:D stack:0 pid:3914 tgid:3914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0789d84 r8:00000002 r7:60000113 r6:e0789d8c r5:844d9800 r4:844d9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844d9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0789e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdd900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844d9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bbfb8c r4:84bbf800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bbfb8c r4:84bde400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844d9800 r8:84bde42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde400 r8:8027f5e8 r7:e0759e60 r6:84bde480 r5:844d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0789fb0 to 0xe0789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdd840 INFO: task kworker/0:98:3914 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ae214000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:99:3918 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:99 state:D stack:0 pid:3918 tgid:3918 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07a5d84 r8:00000002 r7:60000113 r6:e07a5d8c r5:844dec00 r4:844dec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844dec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07a5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bddc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07bf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc038c r4:84bc0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc038c r4:84bde500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dec00 r8:84bde52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde500 r8:8027f5e8 r7:e0759e60 r6:84bde580 r5:844dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07a5fb0 to 0xe07a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bddd00 INFO: task kworker/0:99:3918 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ae214000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:100:3920 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:100 state:D stack:0 pid:3920 tgid:3920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07bdd84 r8:00000002 r7:60000013 r6:e07bdd8c r5:844c0000 r4:844c0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844c0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07bde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a93c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc0b8c r4:84bc0800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc0b8c r4:84bde600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c0000 r8:84bde62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde600 r8:8027f5e8 r7:e07a5e60 r6:84bde680 r5:844c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07bdfb0 to 0xe07bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bddc00 INFO: task kworker/0:100:3920 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ae657000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:101:3921 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:101 state:D stack:0 pid:3921 tgid:3921 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07cdd84 r8:00000002 r7:60000013 r6:e07cdd8c r5:844c0c00 r4:844c0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844c0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07cde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdde80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc078c r4:84bc0400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc078c r4:84bde700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c0c00 r8:84bde72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde700 r8:8027f5e8 r7:e07bde60 r6:84bde780 r5:844c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07cdfb0 to 0xe07cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdde40 INFO: task kworker/0:101:3921 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ae6e5000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:102:3923 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:102 state:D stack:0 pid:3923 tgid:3923 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07e1d84 r8:00000002 r7:60000013 r6:e07e1d8c r5:844c3000 r4:844c3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844c3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c3000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc0f8c r4:84bc0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc0f8c r4:84bde800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c3000 r8:84bde82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde800 r8:8027f5e8 r7:e07bde60 r6:84bde880 r5:844c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e1fb0 to 0xe07e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd4100 INFO: task kworker/0:102:3923 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: aebaa000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:103:3925 blocked for more than 455 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:103 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07e5d84 r8:00000002 r7:60000113 r6:e07e5d8c r5:844c3c00 r4:844c3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844c3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07e5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd4500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc138c r4:84bc1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc138c r4:84bde900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c3c00 r8:84bde92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bde900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bde900 r8:8027f5e8 r7:e07e1e60 r6:84bde980 r5:844c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07e5fb0 to 0xe07e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd4100 INFO: task kworker/0:103:3925 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: aee61000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:104:3926 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:104 state:D stack:0 pid:3926 tgid:3926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07f1d84 r8:00000002 r7:60000113 r6:e07f1d8c r5:844c1800 r4:844c1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844c1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd4bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0cd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e080d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc238c r4:84bc2000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc238c r4:84bdea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c1800 r8:84bdea2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdea00 r8:8027f5e8 r7:e07e5e60 r6:84bdea80 r5:844c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f1fb0 to 0xe07f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd43c0 INFO: task kworker/0:104:3926 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: aef5b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:105:3929 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:105 state:D stack:0 pid:3929 tgid:3929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07fdd84 r8:00000002 r7:60000013 r6:e07fdd8c r5:844c5400 r4:844c5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844c5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07fde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd4600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc178c r4:84bc1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc178c r4:84bdeb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c5400 r8:84bdeb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdeb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdeb00 r8:8027f5e8 r7:e07f1e60 r6:84bdeb80 r5:844c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07fdfb0 to 0xe07fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd4640 INFO: task kworker/0:105:3929 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: af424000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:106:3931 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:106 state:D stack:0 pid:3931 tgid:3931 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0805d84 r8:00000002 r7:60000013 r6:e0805d8c r5:844c6000 r4:844c6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844c6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0805e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd47c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc1b8c r4:84bc1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc1b8c r4:84bdec00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c6000 r8:84bdec2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdec00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdec00 r8:8027f5e8 r7:e07f1e60 r6:84bdec80 r5:844c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0805fb0 to 0xe0805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd4780 INFO: task kworker/0:106:3931 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: af424000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:107:3933 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:107 state:D stack:0 pid:3933 tgid:3933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0811d84 r8:00000002 r7:60000013 r6:e0811d8c r5:844c6c00 r4:844c6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844c6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0811e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd49c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0807000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc1f8c r4:84bc1c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc1f8c r4:84bded00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c6c00 r8:84bded2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bded00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bded00 r8:8027f5e8 r7:e07f1e60 r6:84bded80 r5:844c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0811fb0 to 0xe0811ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd4980 INFO: task kworker/0:107:3933 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: af664000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:108:3935 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:108 state:D stack:0 pid:3935 tgid:3935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0821d84 r8:00000002 r7:60000113 r6:e0821d8c r5:844c2400 r4:844c2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844c2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0821e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bd4c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0817000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc278c r4:84bc2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc278c r4:84bdee80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c2400 r8:84bdeeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdee80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdee80 r8:8027f5e8 r7:e07f1e60 r6:84bdef00 r5:844c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0821fb0 to 0xe0821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd4900 INFO: task kworker/0:108:3935 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: afb33000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:109:3937 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:109 state:D stack:0 pid:3937 tgid:3937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0825d84 r8:00000002 r7:60000013 r6:e0825d8c r5:85078000 r4:85078000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85078000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0825e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beb500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85078000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e081d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc2b8c r4:84bc2800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc2b8c r4:84bdee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078000 r8:84bdee2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdee00 r8:8027f5e8 r7:e0821e60 r6:84bf3c00 r5:85078000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0825fb0 to 0xe0825ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bd4cc0 INFO: task kworker/0:109:3937 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: afcf3000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:110:3940 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:110 state:D stack:0 pid:3940 tgid:3940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e083dd84 r8:00000002 r7:60000013 r6:e083dd8c r5:8507b000 r4:8507b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e083de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdddc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e082f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc2f8c r4:84bc2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc2f8c r4:84bdef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507b000 r8:84bdefac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdef80 r8:8027f5e8 r7:e0825e60 r6:84bf3d00 r5:8507b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe083dfb0 to 0xe083dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bddfc0 INFO: task kworker/0:110:3940 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b029a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:111:3941 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:111 state:D stack:0 pid:3941 tgid:3941 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0845d84 r8:00000002 r7:60000013 r6:e0845d8c r5:8507bc00 r4:8507bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0845e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0835000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc338c r4:84bc3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc338c r4:84bd9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507bc00 r8:84bd902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9000 r8:8027f5e8 r7:e083de60 r6:84bf3d80 r5:8507bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0845fb0 to 0xe0845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be7080 INFO: task kworker/0:111:3941 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b064b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:112:3943 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:112 state:D stack:0 pid:3943 tgid:3943 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0855d84 r8:00000002 r7:60000013 r6:e0855d8c r5:8507c800 r4:8507c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0855e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0851000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc3b8c r4:84bc3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc3b8c r4:84bd9080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507c800 r8:84bd90ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9080 r8:8027f5e8 r7:e0845e60 r6:84bf3e00 r5:8507c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0855fb0 to 0xe0855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be72c0 INFO: task kworker/0:112:3943 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b0991000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:113:3944 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:113 state:D stack:0 pid:3944 tgid:3944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e07b5d84 r8:00000002 r7:60000013 r6:e07b5d8c r5:844de000 r4:844de000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844de000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7180 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844de000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e084b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc378c r4:84bc3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc378c r4:84bd9100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844de000 r8:84bd912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9100 r8:8027f5e8 r7:e0855e60 r6:84bd9180 r5:844de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b5fb0 to 0xe07b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be72c0 INFO: task kworker/0:113:3944 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b0f34000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:114:3947 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:114 state:D stack:0 pid:3947 tgid:3947 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0849d84 r8:00000002 r7:60000013 r6:e0849d8c r5:844dc800 r4:844dc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844dc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0849e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844dc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0869000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd038c r4:84bd0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd038c r4:84bd9200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844dc800 r8:84bd922c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9200 r8:8027f5e8 r7:e0855e60 r6:84bd9280 r5:844dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0849fb0 to 0xe0849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be7340 INFO: task kworker/0:114:3947 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b13ed000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:115:3948 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:115 state:D stack:0 pid:3948 tgid:3948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e082dd84 r8:00000002 r7:60000013 r6:e082dd8c r5:844c4800 r4:844c4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844c4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e082de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0db000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0863000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bc3f8c r4:84bc3c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bc3f8c r4:84bd9300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844c4800 r8:84bd932c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9300 r8:8027f5e8 r7:e0849e60 r6:84bd9380 r5:844c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe082dfb0 to 0xe082dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be7340 INFO: task kworker/0:115:3948 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b13ed000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:116:3951 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:116 state:D stack:0 pid:3951 tgid:3951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0861d84 r8:00000002 r7:60000113 r6:e0861d8c r5:84880000 r4:84880000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84880000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0861e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84880000 r7:00000000 r6:83018000 r5:00001000 r4:7f0df000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0873000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd078c r4:84bd0400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd078c r4:84bd9400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84880000 r8:84bd942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9400 r8:8027f5e8 r7:e0849e60 r6:84bd9480 r5:84880000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0861fb0 to 0xe0861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be7880 INFO: task kworker/0:116:3951 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b1ac9000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:117:3953 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:117 state:D stack:0 pid:3953 tgid:3953 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0889d84 r8:00000002 r7:60000113 r6:e0889d8c r5:84880c00 r4:84880c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84880c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0889e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84880c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0893000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd0f8c r4:84bd0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd0f8c r4:84bd9500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84880c00 r8:84bd952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9500 r8:8027f5e8 r7:e0861e60 r6:84bd9580 r5:84880c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0889fb0 to 0xe0889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be7400 INFO: task kworker/0:117:3953 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b20c9000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:118:3955 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:118 state:D stack:0 pid:3955 tgid:3955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e086dd84 r8:00000002 r7:60000113 r6:e086dd8c r5:84881800 r4:84881800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84881800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e086de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84881800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0885000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd0b8c r4:84bd0800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd0b8c r4:84bd9600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84881800 r8:84bd962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9600 r8:8027f5e8 r7:e0889e60 r6:84bd9680 r5:84881800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe086dfb0 to 0xe086dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be7400 INFO: task kworker/0:118:3955 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b2482000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:119:3958 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:119 state:D stack:0 pid:3958 tgid:3958 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0891d84 r8:00000002 r7:60000013 r6:e0891d8c r5:84882400 r4:84882400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84882400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0891e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84882400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df8ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd138c r4:84bd1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd138c r4:84bd9700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84882400 r8:84bd972c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9700 r8:8027f5e8 r7:e0889e60 r6:84bd9780 r5:84882400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0891fb0 to 0xe0891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be7b00 INFO: task kworker/0:119:3958 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b29d8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:120:3960 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:120 state:D stack:0 pid:3960 tgid:3960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e089dd84 r8:00000002 r7:60000013 r6:e089dd8c r5:84883c00 r4:84883c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84883c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e089de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84883c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd178c r4:84bd1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd178c r4:84bd9800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84883c00 r8:84bd982c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9800 r8:8027f5e8 r7:e0891e60 r6:84bd9880 r5:84883c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe089dfb0 to 0xe089dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be7bc0 INFO: task kworker/0:120:3960 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b2a74000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:121:3962 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:121 state:D stack:0 pid:3962 tgid:3962 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08a1d84 r8:00000002 r7:60000013 r6:e08a1d8c r5:84885400 r4:84885400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84885400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08a1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a78000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84885400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbbb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd1b8c r4:84bd1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd1b8c r4:84bd9900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84885400 r8:84bd992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9900 r8:8027f5e8 r7:e089de60 r6:84bd9980 r5:84885400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08a1fb0 to 0xe08a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be7cc0 INFO: task kworker/0:121:3962 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b2ee3000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:122:3964 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:122 state:D stack:0 pid:3964 tgid:3964 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e01d9d84 r8:00000002 r7:60000013 r6:e01d9d8c r5:84884800 r4:84884800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84884800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01d9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a781c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84884800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc0b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd1f8c r4:84bd1c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd1f8c r4:84bd9a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84884800 r8:84bd9a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9a00 r8:8027f5e8 r7:e08a1e60 r6:84bd9a80 r5:84884800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01d9fb0 to 0xe01d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a78040 INFO: task kworker/0:122:3964 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b31ce000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:123:3966 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:123 state:D stack:0 pid:3966 tgid:3966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08a9d84 r8:00000002 r7:60000113 r6:e08a9d8c r5:84886c00 r4:84886c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84886c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08a9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a78780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84886c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd278c r4:84bd2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd278c r4:84bd9b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84886c00 r8:84bd9b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9b00 r8:8027f5e8 r7:e01d9e60 r6:84bd9b80 r5:84886c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08a9fb0 to 0xe08a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a78340 INFO: task kworker/0:123:3966 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b3480000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:124:3967 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:124 state:D stack:0 pid:3967 tgid:3967 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08add84 r8:00000002 r7:60000013 r6:e08add8c r5:85038000 r4:85038000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85038000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08ade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a786c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85038000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcb5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd238c r4:84bd2000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd238c r4:84bd9c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85038000 r8:84bd9c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9c00 r8:8027f5e8 r7:e08a9e60 r6:84bd9c80 r5:85038000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08adfb0 to 0xe08adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a78340 INFO: task kworker/0:124:3967 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b39cb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:125:3971 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:125 state:D stack:0 pid:3971 tgid:3971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08b5d84 r8:00000002 r7:60000113 r6:e08b5d8c r5:8503a400 r4:8503a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8503a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08b5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a789c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8503a400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfddf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd2b8c r4:84bd2800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd2b8c r4:84bd9d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503a400 r8:84bd9d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9d00 r8:8027f5e8 r7:e08a9e60 r6:84bd9d80 r5:8503a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08b5fb0 to 0xe08b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a787c0 INFO: task kworker/0:125:3971 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b39cb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:126:3973 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:126 state:D stack:0 pid:3973 tgid:3973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08b9d84 r8:00000002 r7:60000013 r6:e08b9d8c r5:8503b000 r4:8503b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8503b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08b9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a78d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8503b000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff91000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd338c r4:84bd3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd338c r4:84bd9e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503b000 r8:84bd9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9e00 r8:8027f5e8 r7:e08b5e60 r6:84bd9e80 r5:8503b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08b9fb0 to 0xe08b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a78980 INFO: task kworker/0:126:3973 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b3cf1000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:127:3975 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:127 state:D stack:0 pid:3975 tgid:3975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08bdd84 r8:00000002 r7:60000013 r6:e08bdd8c r5:8503bc00 r4:8503bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8503bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08bde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a78b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8503bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff75000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd2f8c r4:84bd2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd2f8c r4:84bd9f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503bc00 r8:84bd9f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bd9f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bd9f00 r8:8027f5e8 r7:e08b9e60 r6:84bd9f80 r5:8503bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08bdfb0 to 0xe08bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a78b40 INFO: task kworker/0:127:3975 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b3f8e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:128:3977 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:128 state:D stack:0 pid:3977 tgid:3977 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08c1d84 r8:00000002 r7:60000013 r6:e08c1d8c r5:8503c800 r4:8503c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8503c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08c1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be7f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8503c800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd378c r4:84bd3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd378c r4:84a7b000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503c800 r8:84a7b02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b000 r8:8027f5e8 r7:e08b9e60 r6:84a7b080 r5:8503c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08c1fb0 to 0xe08c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a78d40 INFO: task kworker/0:128:3977 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b426f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:305:3979 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:305 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e01b9d84 r8:00000002 r7:60000113 r6:e01b9d8c r5:8507a400 r4:8507a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e01b9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bac80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8507a400 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0005000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505ab8c r4:8505a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8505ab8c r4:84bf3e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507a400 r8:84bf3eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf3e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf3e80 r8:8027f5e8 r7:e06a9e60 r6:84bf3f00 r5:8507a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe01b9fb0 to 0xe01b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c98c0 INFO: task kworker/1:305:3979 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b45af000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:3980 blocked for more than 456 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:3980 tgid:3980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08a5d84 r8:00000002 r7:60000113 r6:e08a5d8c r5:8507d400 r4:8507d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08a5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c92c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8507d400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505878c r4:85058400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8505878c r4:84bf3f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507d400 r8:84bf3fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bf3f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf3f80 r8:8027f5e8 r7:e01b9e60 r6:84bf3c80 r5:8507d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08a5fb0 to 0xe08a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c98c0 INFO: task kworker/1:306:3980 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b487c000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:129:3982 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:129 state:D stack:0 pid:3982 tgid:3982 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08c9d84 r8:00000002 r7:60000013 r6:e08c9d8c r5:8507e000 r4:8507e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08c9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe3040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507e000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd3b8c r4:84bd3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd3b8c r4:84a7b100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507e000 r8:84a7b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b100 r8:8027f5e8 r7:e08c1e60 r6:84bf3680 r5:8507e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08c9fb0 to 0xe08c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a78f40 INFO: task kworker/0:129:3982 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b4ae3000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:130:3985 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:130 state:D stack:0 pid:3985 tgid:3985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08d5d84 r8:00000002 r7:60000013 r6:e08d5d8c r5:85078c00 r4:85078c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85078c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08d5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe3140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85078c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0035000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84bd3f8c r4:84bd3c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84bd3f8c r4:84a7b180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85078c00 r8:84a7b1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b180 r8:8027f5e8 r7:e08c9e60 r6:84bf3700 r5:85078c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08d5fb0 to 0xe08d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3280 INFO: task kworker/0:130:3985 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b4eeb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:131:3986 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:131 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08d9d84 r8:00000002 r7:60000013 r6:e08d9d8c r5:8507ec00 r4:8507ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8507ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08d9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe32c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8507ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0065000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b038c r4:850b0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b038c r4:84a7b200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8507ec00 r8:84a7b22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b200 r8:8027f5e8 r7:e08d5e60 r6:84bf3780 r5:8507ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08d9fb0 to 0xe08d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3100 INFO: task kworker/0:131:3986 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b4eeb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:132:3988 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:132 state:D stack:0 pid:3988 tgid:3988 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08e1d84 r8:00000002 r7:60000013 r6:e08e1d8c r5:84b95400 r4:84b95400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b95400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08e1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe3580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b95400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0197000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b0b8c r4:850b0800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b0b8c r4:84a7b280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b95400 r8:84a7b2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b280 r8:8027f5e8 r7:e08d9e60 r6:84bf3880 r5:84b95400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08e1fb0 to 0xe08e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3500 INFO: task kworker/0:132:3988 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b5204000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:133:3990 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:133 state:D stack:0 pid:3990 tgid:3990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08e9d84 r8:00000002 r7:60000113 r6:e08e9d8c r5:85080000 r4:85080000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85080000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08e9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe33c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85080000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0085000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b078c r4:850b0400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b078c r4:84a7b300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85080000 r8:84a7b32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b300 r8:8027f5e8 r7:e08e1e60 r6:84bf3900 r5:85080000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08e9fb0 to 0xe08e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3500 INFO: task kworker/0:133:3990 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b557c000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:134:3992 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:134 state:D stack:0 pid:3992 tgid:3992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08edd84 r8:00000002 r7:60000113 r6:e08edd8c r5:85081800 r4:85081800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85081800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08ede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe38c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85081800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b178c r4:850b1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b178c r4:84a7b380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85081800 r8:84a7b3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b380 r8:8027f5e8 r7:e08e1e60 r6:84bf3980 r5:85081800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08edfb0 to 0xe08edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3340 INFO: task kworker/0:134:3992 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b5790000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:135:3994 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:135 state:D stack:0 pid:3994 tgid:3994 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08f5d84 r8:00000002 r7:60000113 r6:e08f5d8c r5:85080c00 r4:85080c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85080c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe3640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85080c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01a7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b0f8c r4:850b0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b0f8c r4:84a7b400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85080c00 r8:84a7b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b400 r8:8027f5e8 r7:e08ede60 r6:84bf3800 r5:85080c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08f5fb0 to 0xe08f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3740 INFO: task kworker/0:135:3994 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b5ae6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:307:3995 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:307 state:D stack:0 pid:3995 tgid:3995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08f9d84 r8:00000002 r7:60000113 r6:e08f9d8c r5:85083000 r4:85083000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85083000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08f9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cee40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85083000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e097d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85058b8c r4:85058800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85058b8c r4:84ab5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85083000 r8:84ab502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ab5000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab5000 r8:8027f5e8 r7:e01b9e60 r6:84ab5080 r5:85083000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08f9fb0 to 0xe08f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c9ec0 INFO: task kworker/1:307:3995 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b5cba000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:136:3997 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:136 state:D stack:0 pid:3997 tgid:3997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0901d84 r8:00000002 r7:60000013 r6:e0901d8c r5:85082400 r4:85082400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85082400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0901e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe3680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85082400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01bb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b138c r4:850b1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b138c r4:84a7b480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85082400 r8:84a7b4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b480 r8:8027f5e8 r7:e08ede60 r6:84ab5100 r5:85082400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0901fb0 to 0xe0901ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3940 INFO: task kworker/0:136:3997 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b5f8a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:137:3999 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:137 state:D stack:0 pid:3999 tgid:3999 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0909d84 r8:00000002 r7:60000013 r6:e0909d8c r5:85083c00 r4:85083c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85083c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0909e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a78f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85083c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e064f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b2b8c r4:850b2800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b2b8c r4:84a7b500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85083c00 r8:84a7b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b500 r8:8027f5e8 r7:e08ede60 r6:84ab5180 r5:85083c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0909fb0 to 0xe0909ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe37c0 INFO: task kworker/0:137:3999 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b6260000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:138:4001 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:138 state:D stack:0 pid:4001 tgid:4001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e091dd84 r8:00000002 r7:60000113 r6:e091dd8c r5:85084800 r4:85084800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85084800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e091de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe3a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85084800 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b1b8c r4:850b1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b1b8c r4:84a7b580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85084800 r8:84a7b5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b580 r8:8027f5e8 r7:e0909e60 r6:84ab5200 r5:85084800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe091dfb0 to 0xe091dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3900 INFO: task kworker/0:138:4001 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b64a8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:139:4003 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:139 state:D stack:0 pid:4003 tgid:4003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0929d84 r8:00000002 r7:60000013 r6:e0929d8c r5:85086c00 r4:85086c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85086c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0929e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe3c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85086c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0209000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b1f8c r4:850b1c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b1f8c r4:84a7b600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85086c00 r8:84a7b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b600 r8:8027f5e8 r7:e0909e60 r6:84ab5280 r5:85086c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0929fb0 to 0xe0929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3a40 INFO: task kworker/0:139:4003 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b64a8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:140:4005 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:140 state:D stack:0 pid:4005 tgid:4005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0931d84 r8:00000002 r7:60000113 r6:e0931d8c r5:85086000 r4:85086000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85086000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0931e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe3cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85086000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0229000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b238c r4:850b2000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b238c r4:84a7b680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85086000 r8:84a7b6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b680 r8:8027f5e8 r7:e0909e60 r6:84ab5300 r5:85086000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0931fb0 to 0xe0931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3b40 INFO: task kworker/0:140:4005 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b6889000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:141:4007 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:141 state:D stack:0 pid:4007 tgid:4007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0955d84 r8:00000002 r7:60000013 r6:e0955d8c r5:85085400 r4:85085400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85085400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0955e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83fe3e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85085400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b278c r4:850b2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b278c r4:84a7b700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85085400 r8:84a7b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b700 r8:8027f5e8 r7:e0909e60 r6:84ab5380 r5:85085400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0955fb0 to 0xe0955ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3d00 INFO: task kworker/0:141:4007 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b6b75000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:142:4010 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:142 state:D stack:0 pid:4010 tgid:4010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0959d84 r8:00000002 r7:60000113 r6:e0959d8c r5:84b96c00 r4:84b96c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84b96c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0959e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84917540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b96c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b2f8c r4:850b2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b2f8c r4:84a7b780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b96c00 r8:84a7b7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b780 r8:8027f5e8 r7:e0909e60 r6:84ab5400 r5:84b96c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0959fb0 to 0xe0959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83fe3f00 INFO: task kworker/0:142:4010 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b6df0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:143:4012 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:143 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0971d84 r8:00000002 r7:60000113 r6:e0971d8c r5:85088c00 r4:85088c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85088c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0971e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489d2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85088c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0687000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b3b8c r4:850b3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b3b8c r4:84a7b800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85088c00 r8:84a7b82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b800 r8:8027f5e8 r7:e0959e60 r6:84ab5480 r5:85088c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0971fb0 to 0xe0971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a93140 INFO: task kworker/0:143:4012 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b6df0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:144:4013 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:144 state:D stack:0 pid:4013 tgid:4013 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0975d84 r8:00000002 r7:60000113 r6:e0975d8c r5:85089800 r4:85089800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85089800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0975e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489d000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85089800 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b338c r4:850b3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b338c r4:84a7b880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85089800 r8:84a7b8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b880 r8:8027f5e8 r7:e0971e60 r6:84ab5500 r5:85089800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0975fb0 to 0xe0975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a97f80 INFO: task kworker/0:144:4013 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b7379000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:145:4016 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:145 state:D stack:0 pid:4016 tgid:4016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e4989d84 r8:00000002 r7:60000113 r6:e4989d8c r5:85088000 r4:85088000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85088000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4989e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489d0c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85088000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0675000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b378c r4:850b3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b378c r4:84a7b900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85088000 r8:84a7b92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b900 r8:8027f5e8 r7:e0971e60 r6:84ab5580 r5:85088000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4989fb0 to 0xe4989ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489d280 INFO: task kworker/0:145:4016 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b757c000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:146:4017 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:146 state:D stack:0 pid:4017 tgid:4017 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e498dd84 r8:00000002 r7:60000013 r6:e498dd8c r5:8508a400 r4:8508a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e498de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489d500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8508a400 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0935000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b438c r4:850b4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b438c r4:84a7b980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508a400 r8:84a7b9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7b980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7b980 r8:8027f5e8 r7:e0971e60 r6:84ab5600 r5:8508a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe498dfb0 to 0xe498dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489d100 INFO: task kworker/0:146:4017 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b7908000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:147:4019 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:147 state:D stack:0 pid:4019 tgid:4019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e49b5d84 r8:00000002 r7:60000113 r6:e49b5d8c r5:8508c800 r4:8508c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49b5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489d440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8508c800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e090f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b3f8c r4:850b3c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b3f8c r4:84a7ba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508c800 r8:84a7ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7ba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7ba00 r8:8027f5e8 r7:e498de60 r6:84ab5680 r5:8508c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49b5fb0 to 0xe49b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489d200 INFO: task kworker/0:147:4019 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b7964000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:148:4021 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:148 state:D stack:0 pid:4021 tgid:4021 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e49bdd84 r8:00000002 r7:60000013 r6:e49bdd8c r5:8508bc00 r4:8508bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49bde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489d840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8508bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b4b8c r4:850b4800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b4b8c r4:84a7ba80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508bc00 r8:84a7baac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7ba80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7ba80 r8:8027f5e8 r7:e498de60 r6:84ab5700 r5:8508bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49bdfb0 to 0xe49bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489d380 INFO: task kworker/0:148:4021 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b7bbb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:149:4023 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:149 state:D stack:0 pid:4023 tgid:4023 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e49c5d84 r8:00000002 r7:60000013 r6:e49c5d8c r5:8508b000 r4:8508b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49c5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489d600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8508b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e095f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b478c r4:850b4400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b478c r4:84a7bb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508b000 r8:84a7bb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7bb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7bb00 r8:8027f5e8 r7:e49bde60 r6:84ab5780 r5:8508b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49c5fb0 to 0xe49c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489d540 INFO: task kworker/0:149:4023 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b7def000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:308:4026 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:308 state:D stack:0 pid:4026 tgid:4026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e08c5d84 r8:00000002 r7:60000113 r6:e08c5d8c r5:8508e000 r4:8508e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e08c5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84837600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8508e000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfebb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505938c r4:85059000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8505938c r4:84ab5800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508e000 r8:84ab582c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ab5800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab5800 r8:8027f5e8 r7:e01b9e60 r6:84ab5880 r5:8508e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe08c5fb0 to 0xe08c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cefc0 INFO: task kworker/1:308:4026 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b7ffd000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:150:4028 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:150 state:D stack:0 pid:4028 tgid:4028 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e49d1d84 r8:00000002 r7:60000013 r6:e49d1d8c r5:8508ec00 r4:8508ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49d1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489d900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8508ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49d3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b4f8c r4:850b4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b4f8c r4:84a7bb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508ec00 r8:84a7bbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7bb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7bb80 r8:8027f5e8 r7:e49bde60 r6:84ab5900 r5:8508ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49d1fb0 to 0xe49d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489d8c0 INFO: task kworker/0:150:4028 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b8127000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:151:4030 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:151 state:D stack:0 pid:4030 tgid:4030 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e068dd84 r8:00000002 r7:60000113 r6:e068dd8c r5:8508d400 r4:8508d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8508d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e068de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489dc00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8508d400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b578c r4:850b5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b578c r4:84a7bc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8508d400 r8:84a7bc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7bc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7bc00 r8:8027f5e8 r7:e49d1e60 r6:84ab5980 r5:8508d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe068dfb0 to 0xe068dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489d800 INFO: task kworker/0:151:4030 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b8371000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:152:4032 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:152 state:D stack:0 pid:4032 tgid:4032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0799d84 r8:00000002 r7:60000013 r6:e0799d8c r5:85090000 r4:85090000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85090000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0799e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489db00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85090000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df945000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b538c r4:850b5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b538c r4:84a7bc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85090000 r8:84a7bcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7bc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7bc80 r8:8027f5e8 r7:e068de60 r6:84ab5a00 r5:85090000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0799fb0 to 0xe0799ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489da40 INFO: task kworker/0:152:4032 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b8636000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:153:4034 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:153 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0841d84 r8:00000002 r7:60000113 r6:e0841d8c r5:85091800 r4:85091800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85091800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0841e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489dd00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85091800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa79000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b5b8c r4:850b5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b5b8c r4:84a7bd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85091800 r8:84a7bd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7bd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7bd00 r8:8027f5e8 r7:e068de60 r6:84ab5a80 r5:85091800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0841fb0 to 0xe0841ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489db80 INFO: task kworker/0:153:4034 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b8636000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:154:4036 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:154 state:D stack:0 pid:4036 tgid:4036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e49ddd84 r8:00000002 r7:60000113 r6:e49ddd8c r5:85093000 r4:85093000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85093000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49dde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848ce3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85093000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfce5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b638c r4:850b6000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b638c r4:84a7bd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85093000 r8:84a7bdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7bd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7bd80 r8:8027f5e8 r7:e0841e60 r6:84ab5b00 r5:85093000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49ddfb0 to 0xe49ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489dc80 INFO: task kworker/0:154:4036 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b895a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:155:4037 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:155 state:D stack:0 pid:4037 tgid:4037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e49e1d84 r8:00000002 r7:60000113 r6:e49e1d8c r5:85090c00 r4:85090c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85090c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49e1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489dec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85090c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b5f8c r4:850b5c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b5f8c r4:84a7be00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85090c00 r8:84a7be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7be00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7be00 r8:8027f5e8 r7:e49dde60 r6:84ab5b80 r5:85090c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49e1fb0 to 0xe49e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489dc80 INFO: task kworker/0:155:4037 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b8b7d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:156:4039 blocked for more than 457 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:156 state:D stack:0 pid:4039 tgid:4039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e49f1d84 r8:00000002 r7:60000113 r6:e49f1d8c r5:85092400 r4:85092400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85092400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49f1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843621c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85092400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff25000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b6f8c r4:850b6c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b6f8c r4:84a7be80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85092400 r8:84a7beac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7be80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7be80 r8:8027f5e8 r7:e49dde60 r6:84ab5c00 r5:85092400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49f1fb0 to 0xe49f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489de80 INFO: task kworker/0:156:4039 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b8ca0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:157:4041 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:157 state:D stack:0 pid:4041 tgid:4041 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e49f9d84 r8:00000002 r7:60000113 r6:e49f9d8c r5:85093c00 r4:85093c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85093c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49f9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84917600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85093c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd67000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b678c r4:850b6400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b678c r4:84a7bf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85093c00 r8:84a7bf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7bf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7bf00 r8:8027f5e8 r7:e49f1e60 r6:84ab5c80 r5:85093c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49f9fb0 to 0xe49f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848ce180 INFO: task kworker/0:157:4041 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b8f21000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:158:4043 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:158 state:D stack:0 pid:4043 tgid:4043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a05d84 r8:00000002 r7:60000013 r6:e8a05d8c r5:85094800 r4:85094800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85094800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a05e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84362040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85094800 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfee7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b6b8c r4:850b6800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b6b8c r4:84a7bf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85094800 r8:84a7bfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84a7bf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a7bf80 r8:8027f5e8 r7:e49f1e60 r6:84ab5d00 r5:85094800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a05fb0 to 0xe8a05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917700 INFO: task kworker/0:158:4043 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b8f21000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:4046 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:4046 tgid:4046 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e49fdd84 r8:00000002 r7:60000113 r6:e49fdd8c r5:85096000 r4:85096000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85096000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49fde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851baa00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85096000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdd5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505a38c r4:8505a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8505a38c r4:84ab5d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85096000 r8:84ab5dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ab5d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab5d80 r8:8027f5e8 r7:e01b9e60 r6:84ab5e00 r5:85096000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49fdfb0 to 0xe49fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848376c0 INFO: task kworker/1:309:4046 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b915d000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:159:4049 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:159 state:D stack:0 pid:4049 tgid:4049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a09d84 r8:00000002 r7:60000113 r6:e8a09d8c r5:85095400 r4:85095400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85095400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84362240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85095400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b738c r4:850b7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b738c r4:83ae2000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85095400 r8:83ae202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2000 r8:8027f5e8 r7:e49f1e60 r6:84ab5e80 r5:85095400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a09fb0 to 0xe8a09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84362380 INFO: task kworker/0:159:4049 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b9368000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:160:4051 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:160 state:D stack:0 pid:4051 tgid:4051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a11d84 r8:00000002 r7:60000113 r6:e8a11d8c r5:85098c00 r4:85098c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85098c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84362500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85098c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e015f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b7b8c r4:850b7800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b7b8c r4:83ae2080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85098c00 r8:83ae20ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2080 r8:8027f5e8 r7:e8a09e60 r6:84ab5f00 r5:85098c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a11fb0 to 0xe8a11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84362300 INFO: task kworker/0:160:4051 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b952c000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:161:4052 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:161 state:D stack:0 pid:4052 tgid:4052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a15d84 r8:00000002 r7:60000113 r6:e8a15d8c r5:85099800 r4:85099800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85099800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a15e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84362300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85099800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0141000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b778c r4:850b7400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b778c r4:83ae2100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85099800 r8:83ae212c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2100 r8:8027f5e8 r7:e8a11e60 r6:84ab5f80 r5:85099800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a15fb0 to 0xe8a15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84362300 INFO: task kworker/0:161:4052 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b96e1000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:162:4054 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:162 state:D stack:0 pid:4054 tgid:4054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a1dd84 r8:00000002 r7:60000113 r6:e8a1dd8c r5:85098000 r4:85098000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85098000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a1de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84362900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85098000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc3b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b878c r4:850b8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b878c r4:83ae2180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85098000 r8:83ae21ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2180 r8:8027f5e8 r7:e8a11e60 r6:848e8000 r5:85098000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a1dfb0 to 0xe8a1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84362440 INFO: task kworker/0:162:4054 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b9952000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:163:4056 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:163 state:D stack:0 pid:4056 tgid:4056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e088dd84 r8:00000002 r7:60000013 r6:e088dd8c r5:8509a400 r4:8509a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e088de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84362700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8509a400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b7f8c r4:850b7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b7f8c r4:83ae2200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509a400 r8:83ae222c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2200 r8:8027f5e8 r7:e8a1de60 r6:848e8080 r5:8509a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe088dfb0 to 0xe088dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84362540 INFO: task kworker/0:163:4056 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b9c21000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:164:4058 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:164 state:D stack:0 pid:4058 tgid:4058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0979d84 r8:00000002 r7:60000013 r6:e0979d8c r5:8509b000 r4:8509b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0979e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:843627c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8509b000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb8b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b838c r4:850b8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b838c r4:83ae2280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509b000 r8:83ae22ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2280 r8:8027f5e8 r7:e8a1de60 r6:848e8100 r5:8509b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0979fb0 to 0xe0979ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84362640 INFO: task kworker/0:164:4058 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b9da9000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:165:4060 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:165 state:D stack:0 pid:4060 tgid:4060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e4985d84 r8:00000002 r7:60000113 r6:e4985d8c r5:8509c800 r4:8509c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4985e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84362bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8509c800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdc9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b8f8c r4:850b8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b8f8c r4:83ae2300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509c800 r8:83ae232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2300 r8:8027f5e8 r7:e8a1de60 r6:848e8180 r5:8509c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4985fb0 to 0xe4985ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84362940 INFO: task kworker/0:165:4060 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: b9f47000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:166:4064 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:166 state:D stack:0 pid:4064 tgid:4064 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a25d84 r8:00000002 r7:60000113 r6:e8a25d8c r5:8509ec00 r4:8509ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a25e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84362a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8509ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b8b8c r4:850b8800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b8b8c r4:83ae2380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509ec00 r8:83ae23ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2380 r8:8027f5e8 r7:e4985e60 r6:848e8200 r5:8509ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a25fb0 to 0xe8a25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84362a80 INFO: task kworker/0:166:4064 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ba085000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:167:4065 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:167 state:D stack:0 pid:4065 tgid:4065 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a29d84 r8:00000002 r7:60000013 r6:e8a29d8c r5:8509bc00 r4:8509bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84362d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8509bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe0d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b938c r4:850b9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b938c r4:83ae2400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509bc00 r8:83ae242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2400 r8:8027f5e8 r7:e4985e60 r6:848e8280 r5:8509bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a29fb0 to 0xe8a29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84362a80 INFO: task kworker/0:167:4065 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ba2a9000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:168:4067 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:168 state:D stack:0 pid:4067 tgid:4067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a31d84 r8:00000002 r7:60000013 r6:e8a31d8c r5:8509e000 r4:8509e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a31e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84362d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8509e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b978c r4:850b9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b978c r4:83ae2480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509e000 r8:83ae24ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2480 r8:8027f5e8 r7:e8a29e60 r6:848e8300 r5:8509e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a31fb0 to 0xe8a31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84362d40 INFO: task kworker/0:168:4067 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ba598000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:169:4068 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:169 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a35d84 r8:00000002 r7:60000113 r6:e8a35d8c r5:85096c00 r4:85096c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85096c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a35e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85096c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0097000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ba78c r4:850ba400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ba78c r4:83ae2500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85096c00 r8:83ae252c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2500 r8:8027f5e8 r7:e8a31e60 r6:848e8380 r5:85096c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a35fb0 to 0xe8a35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84362d40 INFO: task kworker/0:169:4068 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ba8ab000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:170:4070 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:170 state:D stack:0 pid:4070 tgid:4070 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a41d84 r8:00000002 r7:60000113 r6:e8a41d8c r5:850a0c00 r4:850a0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a41e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84362f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b9b8c r4:850b9800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b9b8c r4:83ae2600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a0c00 r8:83ae262c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2600 r8:8027f5e8 r7:e8a35e60 r6:848e8400 r5:850a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a41fb0 to 0xe8a41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489df40 INFO: task kworker/0:170:4070 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: baabb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:171:4072 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:171 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a49d84 r8:00000002 r7:60000113 r6:e8a49d8c r5:850a2400 r4:850a2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a49e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84917a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0023000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850b9f8c r4:850b9c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850b9f8c r4:83ae2580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a2400 r8:83ae25ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2580 r8:8027f5e8 r7:e8a35e60 r6:848e8480 r5:850a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a49fb0 to 0xe8a49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84917580 INFO: task kworker/0:171:4072 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: baabb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:172:4074 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:172 state:D stack:0 pid:4074 tgid:4074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a51d84 r8:00000002 r7:60000013 r6:e8a51d8c r5:850a1800 r4:850a1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a51e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84837e00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e005f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ba38c r4:850ba000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ba38c r4:83ae2680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a1800 r8:83ae26ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2680 r8:8027f5e8 r7:e8a35e60 r6:848e8500 r5:850a1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a51fb0 to 0xe8a51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84837fc0 INFO: task kworker/0:172:4074 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bb2b9000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:4076 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:4076 tgid:4076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a59d84 r8:00000002 r7:60000113 r6:e8a59d8c r5:850a3c00 r4:850a3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e023b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bbf8c r4:850bbc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bbf8c r4:83ae2700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a3c00 r8:83ae272c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2700 r8:8027f5e8 r7:e8a35e60 r6:848e8580 r5:850a3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a59fb0 to 0xe8a59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84837e40 INFO: task kworker/0:173:4076 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bb2b9000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:174:4078 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:174 state:D stack:0 pid:4078 tgid:4078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a61d84 r8:00000002 r7:60000113 r6:e8a61d8c r5:850a0000 r4:850a0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e018b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bab8c r4:850ba800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bab8c r4:83ae2780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a0000 r8:83ae27ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2780 r8:8027f5e8 r7:e8a59e60 r6:848e8600 r5:850a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a61fb0 to 0xe8a61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490f200 INFO: task kworker/0:174:4078 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bb64a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:175:4080 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:175 state:D stack:0 pid:4080 tgid:4080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a69d84 r8:00000002 r7:60000013 r6:e8a69d8c r5:850a3000 r4:850a3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a69e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01a9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850baf8c r4:850bac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850baf8c r4:83ae2800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a3000 r8:83ae282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2800 r8:8027f5e8 r7:e8a59e60 r6:848e8680 r5:850a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a69fb0 to 0xe8a69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490f400 INFO: task kworker/0:175:4080 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bb893000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:176:4082 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:176 state:D stack:0 pid:4082 tgid:4082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e8a71d84 r8:00000002 r7:60000113 r6:e8a71d8c r5:850a4800 r4:850a4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8a71e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bb38c r4:850bb000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bb38c r4:83ae2880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a4800 r8:83ae28ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2880 r8:8027f5e8 r7:e8a59e60 r6:848e8700 r5:850a4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8a71fb0 to 0xe8a71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490f500 INFO: task kworker/0:176:4082 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bb9cc000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:4085 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:4085 tgid:4085 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa89d84 r8:00000002 r7:60000013 r6:eaa89d8c r5:850a5400 r4:850a5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa89e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bb78c r4:850bb400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bb78c r4:83ae2900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a5400 r8:83ae292c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2900 r8:8027f5e8 r7:e8a59e60 r6:848e8780 r5:850a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa89fb0 to 0xeaa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490f7c0 INFO: task kworker/0:177:4085 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bb9cc000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:178:4087 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:178 state:D stack:0 pid:4087 tgid:4087 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa8dd84 r8:00000002 r7:60000013 r6:eaa8dd8c r5:850a6000 r4:850a6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490f640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e021f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bbb8c r4:850bb800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bbb8c r4:83ae2980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a6000 r8:83ae29ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2980 r8:8027f5e8 r7:e8a59e60 r6:848e8800 r5:850a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa8dfb0 to 0xeaa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490f5c0 INFO: task kworker/0:178:4087 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bb9cc000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:179:4089 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:179 state:D stack:0 pid:4089 tgid:4089 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa91d84 r8:00000002 r7:60000113 r6:eaa91d8c r5:850a6c00 r4:850a6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490fac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05b3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bcb8c r4:850bc800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bcb8c r4:83ae2a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a6c00 r8:83ae2a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2a00 r8:8027f5e8 r7:e8a59e60 r6:848e8880 r5:850a6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa91fb0 to 0xeaa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490f740 INFO: task kworker/0:179:4089 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bc357000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:180:4090 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:180 state:D stack:0 pid:4090 tgid:4090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa95d84 r8:00000002 r7:60000013 r6:eaa95d8c r5:8509d400 r4:8509d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8509d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490fa00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8509d400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0263000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bc38c r4:850bc000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bc38c r4:83ae2a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8509d400 r8:83ae2aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2a80 r8:8027f5e8 r7:eaa91e60 r6:848e8900 r5:8509d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa95fb0 to 0xeaa95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490f740 INFO: task kworker/0:180:4090 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bc357000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:181:4092 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:181 state:D stack:0 pid:4092 tgid:4092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa85d84 r8:00000002 r7:60000013 r6:eaa85d8c r5:8503ec00 r4:8503ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8503ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490fb40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8503ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0599000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bc78c r4:850bc400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bc78c r4:83ae2b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503ec00 r8:83ae2b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2b00 r8:8027f5e8 r7:eaa91e60 r6:83ae2b80 r5:8503ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa85fb0 to 0xeaa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490f9c0 INFO: task kworker/0:181:4092 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bc558000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:182:4094 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:182 state:D stack:0 pid:4094 tgid:4094 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa99d84 r8:00000002 r7:60000113 r6:eaa99d8c r5:8503d400 r4:8503d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8503d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa99e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8490fd40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8503d400 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bcf8c r4:850bcc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bcf8c r4:83ae2c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503d400 r8:83ae2c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2c00 r8:8027f5e8 r7:eaa91e60 r6:83ae2c80 r5:8503d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa99fb0 to 0xeaa99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490fd00 INFO: task kworker/0:182:4094 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bc558000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:183:4097 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:183 state:D stack:0 pid:4097 tgid:4097 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaa9dd84 r8:00000002 r7:60000113 r6:eaa9dd8c r5:85039800 r4:85039800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85039800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa9de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85039800 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e067f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bdb8c r4:850bd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bdb8c r4:83ae2d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85039800 r8:83ae2d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2d00 r8:8027f5e8 r7:eaa99e60 r6:83ae2d80 r5:85039800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa9dfb0 to 0xeaa9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490fc80 INFO: task kworker/0:183:4097 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bc8fb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:4098 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:4098 tgid:4098 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e49c1d84 r8:00000002 r7:60000113 r6:e49c1d8c r5:85038c00 r4:85038c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85038c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e49c1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c9b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85038c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0659000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bd38c r4:850bd000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bd38c r4:83ae2e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85038c00 r8:83ae2e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2e00 r8:8027f5e8 r7:eaa9de60 r6:83ae2e80 r5:85038c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe49c1fb0 to 0xe49c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490fc80 INFO: task kworker/0:184:4098 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bc8fb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:185:4101 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:185 state:D stack:0 pid:4101 tgid:4101 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaaa5d84 r8:00000002 r7:60000113 r6:eaaa5d8c r5:8503e000 r4:8503e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8503e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84837fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8503e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e066f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bd78c r4:850bd400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bd78c r4:83ae2f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8503e000 r8:83ae2f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:83ae2f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83ae2f00 r8:8027f5e8 r7:eaa9de60 r6:83ae2f80 r5:8503e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8490ffc0 INFO: task kworker/0:185:4101 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bcfc2000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:186:4103 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:186 state:D stack:0 pid:4103 tgid:4103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaaadd84 r8:00000002 r7:60000113 r6:eaaadd8c r5:85079800 r4:85079800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85079800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f81c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85079800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0691000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bdf8c r4:850bdc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bdf8c r4:850fa000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85079800 r8:850fa02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fa000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fa000 r8:8027f5e8 r7:eaa9de60 r6:850fa080 r5:85079800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaadfb0 to 0xeaaadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f8100 INFO: task kworker/0:186:4103 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bcfc2000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:187:4105 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:187 state:D stack:0 pid:4105 tgid:4105 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaab1d84 r8:00000002 r7:60000113 r6:eaab1d8c r5:84883000 r4:84883000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84883000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84883000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850be78c r4:850be400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850be78c r4:850fa100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84883000 r8:850fa12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fa100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fa100 r8:8027f5e8 r7:eaaade60 r6:850fa180 r5:84883000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab1fb0 to 0xeaab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f8180 INFO: task kworker/0:187:4105 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bd322000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:188:4107 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:188 state:D stack:0 pid:4107 tgid:4107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaab5d84 r8:00000002 r7:60000113 r6:eaab5d8c r5:84886000 r4:84886000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84886000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84886000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850be38c r4:850be000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850be38c r4:850fa200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84886000 r8:850fa22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fa200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fa200 r8:8027f5e8 r7:eaab1e60 r6:850fa280 r5:84886000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab5fb0 to 0xeaab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f85c0 INFO: task kworker/0:188:4107 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bd322000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:189:4109 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:189 state:D stack:0 pid:4109 tgid:4109 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaab9d84 r8:00000002 r7:60000013 r6:eaab9d8c r5:84388000 r4:84388000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84388000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaab9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84388000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850beb8c r4:850be800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850beb8c r4:850fa300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84388000 r8:850fa32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fa300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fa300 r8:8027f5e8 r7:eaab1e60 r6:850fa380 r5:84388000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab9fb0 to 0xeaab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f8440 INFO: task kworker/0:189:4109 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bd871000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:190:4111 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:190 state:D stack:0 pid:4111 tgid:4111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaabdd84 r8:00000002 r7:60000013 r6:eaabdd8c r5:84388c00 r4:84388c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84388c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaabde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f87c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84388c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0763000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bef8c r4:850bec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bef8c r4:850fa400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84388c00 r8:850fa42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fa400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fa400 r8:8027f5e8 r7:eaab9e60 r6:850fa480 r5:84388c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaabdfb0 to 0xeaabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f8540 INFO: task kworker/0:190:4111 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bd871000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:191:4113 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:191 state:D stack:0 pid:4113 tgid:4113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaac1d84 r8:00000002 r7:60000013 r6:eaac1d8c r5:84389800 r4:84389800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84389800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84389800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0779000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bf38c r4:850bf000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bf38c r4:850fa500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84389800 r8:850fa52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fa500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fa500 r8:8027f5e8 r7:eaabde60 r6:850fa580 r5:84389800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac1fb0 to 0xeaac1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f8780 INFO: task kworker/0:191:4113 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bdd26000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:192:4115 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:192 state:D stack:0 pid:4115 tgid:4115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaac5d84 r8:00000002 r7:60000113 r6:eaac5d8c r5:8438a400 r4:8438a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8438a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8438a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bfb8c r4:850bf800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bfb8c r4:850fa600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438a400 r8:850fa62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fa600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fa600 r8:8027f5e8 r7:eaac1e60 r6:850fa680 r5:8438a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac5fb0 to 0xeaac5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f8880 INFO: task kworker/0:192:4115 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bdd26000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:4116 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:4116 tgid:4116 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaaa9d84 r8:00000002 r7:60000113 r6:eaaa9d8c r5:8438b000 r4:8438b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8438b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8438b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0785000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bf78c r4:850bf400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bf78c r4:850fa700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438b000 r8:850fa72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fa700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fa700 r8:8027f5e8 r7:eaac5e60 r6:850fa780 r5:8438b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa9fb0 to 0xeaaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f8ac0 INFO: task kworker/0:193:4116 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: be1bb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:194:4119 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:194 state:D stack:0 pid:4119 tgid:4119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaac9d84 r8:00000002 r7:60000113 r6:eaac9d8c r5:8438bc00 r4:8438bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8438bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84360100 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8438bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c838c r4:850c8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c838c r4:850fa800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438bc00 r8:850fa82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fa800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fa800 r8:8027f5e8 r7:eaac5e60 r6:850fa880 r5:8438bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f8e80 INFO: task kworker/0:194:4119 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: be1bb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:195:4120 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:195 state:D stack:0 pid:4120 tgid:4120 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaacdd84 r8:00000002 r7:60000013 r6:eaacdd8c r5:8438c800 r4:8438c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8438c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaacde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f8e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8438c800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850bff8c r4:850bfc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850bff8c r4:850fa900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438c800 r8:850fa92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fa900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fa900 r8:8027f5e8 r7:eaac9e60 r6:850fa980 r5:8438c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaacdfb0 to 0xeaacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f8e80 INFO: task kworker/0:195:4120 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: be1bb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:196:4122 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:196 state:D stack:0 pid:4122 tgid:4122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaad1d84 r8:00000002 r7:60000113 r6:eaad1d8c r5:8438d400 r4:8438d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8438d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8438d400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07d3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c878c r4:850c8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c878c r4:850faa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438d400 r8:850faa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850faa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850faa00 r8:8027f5e8 r7:eaac9e60 r6:850faa80 r5:8438d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad1fb0 to 0xeaad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f8f80 INFO: task kworker/0:196:4122 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: be9be000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:197:4125 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:197 state:D stack:0 pid:4125 tgid:4125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaad5d84 r8:00000002 r7:60000113 r6:eaad5d8c r5:8438e000 r4:8438e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8438e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8438e000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c8b8c r4:850c8800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c8b8c r4:850fab00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438e000 r8:850fab2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fab00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fab00 r8:8027f5e8 r7:eaad1e60 r6:850fab80 r5:8438e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad5fb0 to 0xeaad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514e0c0 INFO: task kworker/0:197:4125 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: be9be000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:198:4127 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:198 state:D stack:0 pid:4127 tgid:4127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaaddd84 r8:00000002 r7:60000113 r6:eaaddd8c r5:8438ec00 r4:8438ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8438ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaadde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8438ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07f7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c8f8c r4:850c8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c8f8c r4:850fac00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8438ec00 r8:850fac2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fac00 r8:8027f5e8 r7:eaad5e60 r6:850fac80 r5:8438ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaddfb0 to 0xeaaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514e180 INFO: task kworker/0:198:4127 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bee52000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:199:4130 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:199 state:D stack:0 pid:4130 tgid:4130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaae1d84 r8:00000002 r7:60000113 r6:eaae1d8c r5:84810000 r4:84810000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84810000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84810000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa37000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c978c r4:850c9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c978c r4:850fad00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84810000 r8:850fad2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fad00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fad00 r8:8027f5e8 r7:eaadde60 r6:850fad80 r5:84810000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae1fb0 to 0xeaae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514e280 INFO: task kworker/0:199:4130 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bee52000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:200:4131 blocked for more than 458 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:200 state:D stack:0 pid:4131 tgid:4131 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaae5d84 r8:00000002 r7:60000113 r6:eaae5d8c r5:84810c00 r4:84810c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84810c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84810c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df95d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c938c r4:850c9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c938c r4:850fae00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84810c00 r8:850fae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850fae00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850fae00 r8:8027f5e8 r7:eaae1e60 r6:850fae80 r5:84810c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae5fb0 to 0xeaae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514e440 INFO: task kworker/0:200:4131 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bf679000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:201:4133 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:201 state:D stack:0 pid:4133 tgid:4133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:e0859d84 r8:00000002 r7:60000013 r6:e0859d8c r5:84811800 r4:84811800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84811800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0859e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84811800 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd35000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c9f8c r4:850c9c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c9f8c r4:850faf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84811800 r8:850faf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:850faf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850faf00 r8:8027f5e8 r7:eaae1e60 r6:850faf80 r5:84811800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0859fb0 to 0xe0859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514e600 INFO: task kworker/0:201:4133 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bf679000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:202:4135 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:202 state:D stack:0 pid:4135 tgid:4135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaaf1d84 r8:00000002 r7:60000013 r6:eaaf1d8c r5:84812400 r4:84812400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84812400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e7c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84812400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850c9b8c r4:850c9800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850c9b8c r4:85156000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84812400 r8:8515602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156000 r8:8027f5e8 r7:e0859e60 r6:85156080 r5:84812400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf1fb0 to 0xeaaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514e700 INFO: task kworker/0:202:4135 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bf850000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:203:4137 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:203 state:D stack:0 pid:4137 tgid:4137 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaaf5d84 r8:00000002 r7:60000013 r6:eaaf5d8c r5:84813000 r4:84813000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84813000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514ec80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84813000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ca78c r4:850ca400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ca78c r4:85156100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84813000 r8:8515612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156100 r8:8027f5e8 r7:e0859e60 r6:85156180 r5:84813000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf5fb0 to 0xeaaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514eb80 INFO: task kworker/0:203:4137 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bfaff000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:4139 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:204 state:D stack:0 pid:4139 tgid:4139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaaf9d84 r8:00000002 r7:60000113 r6:eaaf9d8c r5:84813c00 r4:84813c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84813c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514e9c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84813c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850ca38c r4:850ca000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850ca38c r4:85156200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84813c00 r8:8515622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156200 r8:8027f5e8 r7:eaaf5e60 r6:85156280 r5:84813c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf9fb0 to 0xeaaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514eb80 INFO: task kworker/0:204:4139 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bfaff000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:205:4141 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:205 state:D stack:0 pid:4141 tgid:4141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaafdd84 r8:00000002 r7:60000113 r6:eaafdd8c r5:84814800 r4:84814800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84814800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaafde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514ed80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84814800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff03000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cab8c r4:850ca800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cab8c r4:85156300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84814800 r8:8515632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156300 r8:8027f5e8 r7:eaaf5e60 r6:85156380 r5:84814800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaafdfb0 to 0xeaafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514ec40 INFO: task kworker/0:205:4141 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: bfdae000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:4143 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:4143 tgid:4143 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab01d84 r8:00000002 r7:60000013 r6:eab01d8c r5:84815400 r4:84815400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84815400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514ef00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84815400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0125000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850caf8c r4:850cac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850caf8c r4:85156400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84815400 r8:8515642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156400 r8:8027f5e8 r7:eaafde60 r6:85156480 r5:84815400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514ed00 INFO: task kworker/0:206:4143 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c00f5000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:4145 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:207 state:D stack:0 pid:4145 tgid:4145 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab05d84 r8:00000002 r7:60000013 r6:eab05d8c r5:84816000 r4:84816000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84816000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab05e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84816000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e080b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cbb8c r4:850cb800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cbb8c r4:85156500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84816000 r8:8515652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156500 r8:8027f5e8 r7:eab01e60 r6:85156580 r5:84816000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab05fb0 to 0xeab05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85164100 INFO: task kworker/0:207:4145 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c06c7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:208:4147 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:4147 tgid:4147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaae9d84 r8:00000002 r7:60000113 r6:eaae9d8c r5:84816c00 r4:84816c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84816c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84816c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0155000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cb38c r4:850cb000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cb38c r4:85156600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84816c00 r8:8515662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156600 r8:8027f5e8 r7:eab05e60 r6:85156680 r5:84816c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae9fb0 to 0xeaae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85164100 INFO: task kworker/0:208:4147 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c06c7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:209:4149 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:209 state:D stack:0 pid:4149 tgid:4149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab09d84 r8:00000002 r7:60000113 r6:eab09d8c r5:84868000 r4:84868000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84868000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84868000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e079b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cb78c r4:850cb400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cb78c r4:85156700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84868000 r8:8515672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156700 r8:8027f5e8 r7:eab05e60 r6:85156780 r5:84868000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab09fb0 to 0xeab09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85164380 INFO: task kworker/0:209:4149 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c06c7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:4151 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:4151 tgid:4151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab0dd84 r8:00000002 r7:60000113 r6:eab0dd8c r5:84868c00 r4:84868c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84868c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84868c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0819000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850cbf8c r4:850cbc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850cbf8c r4:85156800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84868c00 r8:8515682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156800 r8:8027f5e8 r7:eab05e60 r6:85156880 r5:84868c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab0dfb0 to 0xeab0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851643c0 INFO: task kworker/0:210:4151 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c0ca6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:211:4153 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:211 state:D stack:0 pid:4153 tgid:4153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab11d84 r8:00000002 r7:60000113 r6:eab11d8c r5:84869800 r4:84869800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84869800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84869800 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0829000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d438c r4:850d4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d438c r4:85156900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84869800 r8:8515692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156900 r8:8027f5e8 r7:eab0de60 r6:85156980 r5:84869800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab11fb0 to 0xeab11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851644c0 INFO: task kworker/0:211:4153 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c0ca6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:212:4155 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:212 state:D stack:0 pid:4155 tgid:4155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab15d84 r8:00000002 r7:60000113 r6:eab15d8c r5:8486a400 r4:8486a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8486a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8486a400 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e084f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d4b8c r4:850d4800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d4b8c r4:85156a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486a400 r8:85156a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156a00 r8:8027f5e8 r7:eab11e60 r6:85156a80 r5:8486a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab15fb0 to 0xeab15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85164600 INFO: task kworker/0:212:4155 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c1282000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:4158 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:4158 tgid:4158 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab25d84 r8:00000002 r7:60000113 r6:eab25d8c r5:850a8000 r4:850a8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab25e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0837000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d478c r4:850d4400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d478c r4:85156b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a8000 r8:85156b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156b00 r8:8027f5e8 r7:eab15e60 r6:848e8980 r5:850a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab25fb0 to 0xeab25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85164740 INFO: task kworker/0:213:4158 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c1817000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:214:4159 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:214 state:D stack:0 pid:4159 tgid:4159 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab29d84 r8:00000002 r7:60000113 r6:eab29d8c r5:850aa400 r4:850aa400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850aa400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0871000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d538c r4:850d5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d538c r4:85156b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850aa400 r8:85156bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156b80 r8:8027f5e8 r7:eab15e60 r6:848e8a00 r5:850aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab29fb0 to 0xeab29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85164740 INFO: task kworker/0:214:4159 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c1817000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:215:4160 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:215 state:D stack:0 pid:4160 tgid:4160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab2dd84 r8:00000002 r7:60000113 r6:eab2dd8c r5:850a9800 r4:850a9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab2de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0865000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d4f8c r4:850d4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d4f8c r4:85156c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a9800 r8:85156c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156c00 r8:8027f5e8 r7:eab29e60 r6:848e8a80 r5:850a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab2dfb0 to 0xeab2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85164a00 INFO: task kworker/0:215:4160 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c1817000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:216:4163 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:216 state:D stack:0 pid:4163 tgid:4163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab39d84 r8:00000002 r7:60000113 r6:eab39d8c r5:850a8c00 r4:850a8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850a8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab39e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0881000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d578c r4:850d5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d578c r4:85156c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850a8c00 r8:85156cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156c80 r8:8027f5e8 r7:eab29e60 r6:848e8b00 r5:850a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab39fb0 to 0xeab39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85164b00 INFO: task kworker/0:216:4163 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c1817000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:4166 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:4166 tgid:4166 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab45d84 r8:00000002 r7:60000113 r6:eab45d8c r5:850abc00 r4:850abc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850abc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab45e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85164e00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08af000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d5b8c r4:850d5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d5b8c r4:85156d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850abc00 r8:85156d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156d00 r8:8027f5e8 r7:eab39e60 r6:848e8b80 r5:850abc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab45fb0 to 0xeab45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85164cc0 INFO: task kworker/0:217:4166 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c1ced000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:4167 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:4167 tgid:4167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab49d84 r8:00000002 r7:60000013 r6:eab49d8c r5:850ad400 r4:850ad400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ad400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab49e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d5f8c r4:850d5c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d5f8c r4:85156d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ad400 r8:85156dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156d80 r8:8027f5e8 r7:eab45e60 r6:848e8c00 r5:850ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab49fb0 to 0xeab49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85164cc0 INFO: task kworker/0:218:4167 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c1ec9000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:4169 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:4169 tgid:4169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab51d84 r8:00000002 r7:60000113 r6:eab51d8c r5:850ae000 r4:850ae000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ae000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab51e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b14c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0903000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d6b8c r4:850d6800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d6b8c r4:85156e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ae000 r8:85156e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156e00 r8:8027f5e8 r7:eab49e60 r6:848e8c80 r5:850ae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab51fb0 to 0xeab51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b1280 INFO: task kworker/0:219:4169 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c2211000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:220:4170 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:220 state:D stack:0 pid:4170 tgid:4170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab55d84 r8:00000002 r7:60000013 r6:eab55d8c r5:850ac800 r4:850ac800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ac800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab55e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d638c r4:850d6000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d638c r4:85156e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ac800 r8:85156eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156e80 r8:8027f5e8 r7:eab51e60 r6:848e8d00 r5:850ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab55fb0 to 0xeab55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b1280 INFO: task kworker/0:220:4170 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c2298000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:4172 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:4172 tgid:4172 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab5dd84 r8:00000002 r7:60000113 r6:eab5dd8c r5:850ab000 r4:850ab000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850ab000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab5de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b12c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d678c r4:850d6400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d678c r4:85156f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850ab000 r8:85156f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85156f00 r8:8027f5e8 r7:eab51e60 r6:848e8d80 r5:850ab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab5dfb0 to 0xeab5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b1400 INFO: task kworker/0:221:4172 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c2298000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:4173 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:4173 tgid:4173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab61d84 r8:00000002 r7:60000113 r6:eab61d8c r5:850aec00 r4:850aec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:850aec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e090d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d6f8c r4:850d6c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d6f8c r4:85156f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:850aec00 r8:85156fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85156f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c25e3000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:4177 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:223 state:D stack:0 pid:4177 tgid:4177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab71d84 r8:00000002 r7:60000113 r6:eab71d8c r5:8486b000 r4:8486b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8486b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab71e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8486b000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0921000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d738c r4:850d7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d738c r4:851b6000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486b000 r8:851b602c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:851b6000 r8:8027f5e8 r7:eab61e60 r6:848e8e80 r5:8486b000 task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:224:4178 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:224 state:D stack:0 pid:4178 tgid:4178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab79d84 r8:00000002 r7:60000113 r6:eab79d8c r5:8486c800 r4:8486c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8486c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab79e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b1a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8486c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e095d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d7f8c r4:850d7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d7f8c r4:851b6080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486c800 r8:851b60ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b6080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b6080 r8:8027f5e8 r7:eab71e60 r6:848e8f00 r5:8486c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab79fb0 to 0xeab79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b1600 INFO: task kworker/0:224:4178 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:82ac11e4 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:225:4181 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:225 state:D stack:0 pid:4181 tgid:4181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab85d84 r8:00000002 r7:60000013 r6:eab85d8c r5:8486bc00 r4:8486bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8486bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab85e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b17c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8486bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0933000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d778c r4:850d7400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d778c r4:851b6100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486bc00 r8:851b612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b6100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b6100 r8:8027f5e8 r7:eab79e60 r6:848e8f80 r5:8486bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab85fb0 to 0xeab85ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0635d28 to 0xe0635d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:4182 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:4182 tgid:4182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e094f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:850d7b8c r4:850d7800 r10:61c88647 r9:85230c00 r8:851b61ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c3076000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:4185 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:4185 tgid:4185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab81d84 r8:00000002 r7:60000113 r6:eab81d8c r5:85232400 r4:85232400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85232400 r4:829188d8 r4:00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514d040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85232400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d8b8c r4:850d8800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d8b8c r4:851b6280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85232400 r8:851b62ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b6280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b6280 r8:8027f5e8 r7:eab79e60 r6:851b6300 r5:85232400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab81fb0 to 0xeab81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b1ac0 INFO: task kworker/0:227:4185 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c329e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 INFO: task kworker/0:228:4187 blocked for more than 459 seconds. Call trace: [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4981000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d838c r4:850d8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d838c r4:851b6380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85233c00 r8:851b63ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b6380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b6380 r8:8027f5e8 r7:eab81e60 r6:851b6400 r5:85233c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaad9fb0 to 0xeaad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b1c80 INFO: task kworker/0:228:4187 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c348f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:229:4188 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:229 state:D stack:0 pid:4188 tgid:4188 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab8dd84 r8:00000002 r7:60000113 r6:eab8dd8c r5:85231800 r4:85231800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85231800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r4:00000000 r5:00001000 r4:e49b7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d878c r4:850d8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d878c r4:851b6480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85231800 r8:851b64ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b6480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b6480 r8:8027f5e8 r7:eab81e60 r6:851b6500 r5:85231800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab8dfb0 to 0xeab8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b1c80 INFO: task kworker/0:229:4188 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c3737000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 INFO: task kworker/0:230:4191 blocked for more than 459 seconds. Call trace: r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab91e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c12c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85235400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49f5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d938c r4:850d9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d938c r4:851b6580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85235400 r8:851b65ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b6580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b6580 r8:8027f5e8 r7:eab81e60 r6:851b6600 r5:85235400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab91fb0 to 0xeab91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514dd80 INFO: task kworker/0:230:4191 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c3a1f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:4192 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:4192 tgid:4192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab89d84 r8:00000002 r7:60000013 r6:eab89d8c r5:85234800 r4:85234800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85234800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab89e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851c1000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85234800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d8f8c r4:850d8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d8f8c r4:851b6680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85234800 r8:851b66ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b6680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b6680 r8:8027f5e8 r7:eab91e60 r6:851b6700 r5:85234800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab89fb0 to 0xeab89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851c1100 INFO: task kworker/0:231:4192 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c3ce6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:e01b1000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:4199 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:4199 tgid:4199 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaba9d84 r8:00000002 r7:60000013 r6:eaba9d8c r5:85236c00 r4:85236c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85236c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515e740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a37000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d9b8c r4:850d9800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d9b8c r4:851b6780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85236c00 r8:851b67ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b6780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b6780 r8:8027f5e8 r7:eab91e60 r6:851b6800 r5:85236c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851c1640 INFO: task kworker/0:232:4199 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c406b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:310:4200 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:310 state:D stack:0 pid:4200 tgid:4200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab95d84 r8:00000002 r7:60000113 r6:eab95d8c r5:8486e000 r4:8486e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8486e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bab00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8486e000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff85000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505a78c r4:8505a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8505a78c r4:851c8000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8486e000 r8:851c802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8000 r8:8027f5e8 r7:e01b9e60 r6:851c8080 r5:8486e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab95fb0 to 0xeab95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851ba7c0 INFO: task kworker/1:310:4200 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c406b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 INFO: task kworker/1:311:4203 blocked for more than 459 seconds. [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:e00a1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:851c8100 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: c44a2000 e018f000 00000001 80239b98 7f63d000 00000001 r4:00000000 r5:00001000 r4:e01b1000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bae40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85236000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e005d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505af8c r4:8505ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8505af8c r4:851c8200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85236000 r8:851c822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8200 r8:8027f5e8 r7:eaba5e60 r6:851b6880 r5:85236000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabb5fb0 to 0xeabb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851babc0 INFO: task kworker/1:312:4204 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c493e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ba600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01a1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8505b78c r4:8505b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8505b78c r4:851c8280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b8000 r8:851c82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8280 r8:8027f5e8 r7:eaba5e60 r6:851b6900 r5:849b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc1fb0 to 0xeabc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851baec0 INFO: task kworker/1:313:4207 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c493e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 INFO: task kworker/1:314:4208 blocked for more than 459 seconds. r10:829188dc r9:eabc5d84 r8:00000002 r7:60000013 r6:eabc5d8c r5:849b8c00 r4:00000000 r4:00000000 r5:00001000 r4:e0211000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8505bf8c r4:8505bc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b8c00 r8:851c832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8300 r8:8027f5e8 r7:eabc1e60 r6:851b6980 r5:849b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851ba3c0 INFO: task kworker/1:314:4208 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c4c73000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 r4:e0635dc0 r5:00001000 r4:e01b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:315 state:D stack:0 pid:4210 tgid:4210 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0635dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:316:4212 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:316 state:D stack:0 pid:4212 tgid:4212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eabd5d84 r8:00000002 r7:60000113 r6:eabd5d8c r5:849b9800 r4:849b9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849b9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0597000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450af8c r4:8450ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8450af8c r4:851c8480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b9800 r8:851c84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8480 r8:8027f5e8 r7:eabc5e60 r6:851b6a80 r5:849b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851760c0 INFO: task kworker/1:316:4212 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0635dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd9e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a17000 r5:8510b78c r4:8510b400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 r5:80070013 r4:80239bb0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:317:4215 blocked for more than 459 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:317 state:D stack:0 pid:4215 tgid:4215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eabe1d84 r8:00000002 r7:60000013 r6:eabe1d8c r5:849bb000 r4:849bb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849bb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176200 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e023d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450b38c r4:8450b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8450b38c r4:851c8400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849bb000 r8:851c842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8400 r8:8027f5e8 r7:eabd5e60 r6:851b6c00 r5:849bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabe1fb0 to 0xeabe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85176180 INFO: task kworker/1:317:4215 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c5651000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e01b1000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:849bc800 r4:829188d8 r4:00000000 r9:83018205 r8:849bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:00001000 r4:e05b5000 r7:ddde2d80 r6:83018200 r5:8450ab8c r4:851c8500 Exception stack(0xeabe9fb0 to 0xeabe9ff8) Workqueue: events bpf_prog_free_deferred 5d20: c5651000 e018f000 00000001 80239b98 7f63d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eabf1d84 r8:00000002 r7:60000013 r6:eabf1d8c r5:849bd400 r4:849bd400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849bd400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176f80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85109f8c r4:85109c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85109f8c r4:851c8580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849bd400 r8:851c85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8580 r8:8027f5e8 r7:eabe9e60 r6:851b6d00 r5:849bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabf1fb0 to 0xeabf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85176540 task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c5c21000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:849be000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf9e08 r9:83018205 r8:849be000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 r5:00001000 r4:e0651000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:4223 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:4223 tgid:4223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac01d84 r8:00000002 r7:60000113 r6:eac01d8c r5:85230000 r4:85230000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85230000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176600 r5:00001000 r4:e0673000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8510838c r4:85108000 r10:61c88647 r9:85230000 r8:851c86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r5:8436438c r4:84364000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be4100 Workqueue: events bpf_prog_free_deferred r5:85190000 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e068f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85190000 r8:851c872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85176640 INFO: task kworker/1:322:4225 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c6813000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:323:4227 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:323 state:D stack:0 pid:4227 tgid:4227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac11d84 r8:00000002 r7:60000013 r6:eac11d8c r5:85191800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac11e08 r5:00001000 r4:e06d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e071f000 r5:85108f8c r4:85108c00 r4:851c8880 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0635d28 to 0xe0635d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:325:4231 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:325 state:D stack:0 pid:4231 tgid:4231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac21d84 r8:00000002 r7:60000113 r6:eac21d8c r5:85192400 r4:85192400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85192400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac21e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85192400 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e076f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510938c r4:85109000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510938c r4:851c8800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85192400 r8:851c882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8800 r8:8027f5e8 r7:eabf1e60 r6:8515d000 r5:85192400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac21fb0 to 0xeac21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85176cc0 INFO: task kworker/1:325:4231 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 5d20: c7266000 e018f000 00000001 80239b98 7f63d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85193000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0783000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510978c r4:85109400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510978c r4:851c8980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85193000 r8:851c89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8980 r8:8027f5e8 r7:eabf1e60 r6:8515d080 r5:85193000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac29fb0 to 0xeac29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85176e00 INFO: task kworker/1:326:4233 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c7668000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:327:4235 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:327 state:D stack:0 pid:4235 tgid:4235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac31d84 r8:00000002 r7:60000113 r6:eac31d8c r5:85195400 r4:85195400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85195400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85176e40 r5:00001000 r4:e07ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85109b8c r4:851c8900 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85194800 r4:829188d8 r4:00000000 r9:83018205 r8:85194800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 r5:00001000 r4:e07d7000 r7:ddde2d80 r6:83018200 r5:8510a38c r4:851c8a00 r10:00000000 r9:851c8a00 r8:8027f5e8 r7:eabf1e60 r6:8515d180 r5:85194800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac39fb0 to 0xeac39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851ba080 INFO: task kworker/1:328:4237 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c7e9f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:329:4239 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829188dc r9:eac49d84 r8:00000002 r7:60000013 r6:eac49d8c r5:85196c00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e07f5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8510a78c r4:851c8a80 9fa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0897000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8510ab8c r4:851c8b00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:80070013 r4:80239bb0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:331:4243 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:331 state:D stack:0 pid:4243 tgid:4243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac59d84 r8:00000002 r7:60000113 r6:eac59d8c r5:85233000 r4:85233000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85233000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85154300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85233000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510b38c r4:8510b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510b38c r4:851c8b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85233000 r8:851c8bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8b80 r8:8027f5e8 r7:eac51e60 r6:8515d300 r5:85233000 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829188dc r9:eac61d84 r8:00000002 r7:60000113 r6:eac61d8c r5:84900c00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e08cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84900c00 r8:851c8c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85154200 Call trace: 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 INFO: task kworker/1:333:4247 blocked for more than 460 seconds. [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84900000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac69e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bc500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84900000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead43000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85110b8c r4:85110800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85110b8c r4:851c8c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84900000 r8:851c8cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8c80 r8:8027f5e8 r7:eac59e60 r6:8515d400 r5:84900000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac69fb0 to 0xeac69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85154440 INFO: task kworker/1:333:4247 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c8a58000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r9:83018205 r8:84901800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeac6dfb0 to 0xeac6dff8) Workqueue: events bpf_prog_free_deferred 5d20: c8ffc000 e018f000 00000001 80239b98 7f63d000 00000001 r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84903000 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e8a21000 r5:850d978c r4:850d9400 r4:8515d500 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515e940 INFO: task kworker/0:234:4251 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: c9790000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:4253 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/0:235 state:D stack:0 pid:4253 tgid:4253 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfded000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:850daf8c r4:8515d600 dfa0: 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a45000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850d9f8c r4:850d9c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850d9f8c r4:8515d700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84904800 r8:8515d72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8515d700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515d700 r8:8027f5e8 r7:e8a5de60 r6:8515d780 r5:84904800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac71fb0 to 0xeac71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515e340 INFO: task kworker/0:236:4255 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ca464000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:4257 blocked for more than 460 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac79e08 r5:00001000 r4:dfa01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:850da78c r4:8515d800 Exception stack(0xeac79fb0 to 0xeac79ff8) Workqueue: events bpf_prog_free_deferred 5d20: cac75000 e018f000 00000001 80239b98 7f63d000 00000001 r4:00000000 r5:8436438c r4:84364000 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 Not tainted 6.15.0-syzkaller #0 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r4:00000000 r5:00001000 r4:ead37000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511038c r4:85110000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511038c r4:851c8d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84906000 r8:851c8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c8d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c8d80 r8:8027f5e8 r7:eac6de60 r6:8515d900 r5:84906000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab1dfb0 to 0xeab1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85154600 INFO: task kworker/1:335:4261 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: cac75000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:84902400 r4:829188d8 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:dfafd000 r5:850dab8c r4:850da800 r10:00000000 r9:8515d980 r8:8027f5e8 r7:e8a5de60 r6:8515da00 r5:84902400 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0635d28 to 0xe0635d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r5:8436438c r4:84364000 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 r5:00001000 r4:dfedd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84906c00 r8:8515daac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred 5d20: cb472000 e018f000 00000001 80239b98 7f63d000 00000001 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:4266 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:4266 tgid:4266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab4dd84 r8:00000002 r7:60000013 r6:eab4dd8c r5:85198c00 r4:85198c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85198c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab4de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150980 r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b3000 r5:850db78c r4:850db400 r4:8515db80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e081b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85198000 r8:8515dcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85150480 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: cbe36000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:4270 blocked for more than 460 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:4270 tgid:4270 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eab65d84 r8:00000002 r7:60000113 r6:eab65d8c r5:8519a400 r4:8519a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519a400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0213000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850dbb8c r4:850db800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dbb8c r4:8515dd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519a400 r8:8515ddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8515dd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515dd80 r8:8027f5e8 r7:eab3de60 r6:8515de00 r5:8519a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab65fb0 to 0xeab65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85150940 INFO: task kworker/0:242:4270 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: cc3a7000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:4273 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:4273 tgid:4273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac7dd84 r8:00000002 r7:60000013 r6:eac7dd8c r5:8519b000 r4:8519b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac7de08 r4:00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0809000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:850dbf8c r4:850dbc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:850dbf8c r4:8515de80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519b000 r8:8515deac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8515de80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515de80 r8:8027f5e8 r7:eab3de60 r6:8515df00 r5:8519b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac7dfb0 to 0xeac7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85150b40 INFO: task kworker/0:243:4273 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: cca8e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:4275 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:4275 tgid:4275 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac85d84 r8:00000002 r7:60000113 r6:eac85d8c r5:8519bc00 r4:8519bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac85e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85150e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0833000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ec38c r4:851ec000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ec38c r4:8515df80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519bc00 r8:8515dfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8515df80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515df80 r8:8027f5e8 r7:eab3de60 r6:85158000 r5:8519bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac85fb0 to 0xeac85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85150c80 INFO: task kworker/0:244:4275 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ccef9000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:245:4277 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:245 state:D stack:0 pid:4277 tgid:4277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac89d84 r8:00000002 r7:60000113 r6:eac89d8c r5:8519c800 r4:8519c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac89e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489c000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519c800 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e085b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ec78c r4:851ec400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ec78c r4:85158080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519c800 r8:851580ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158080 r8:8027f5e8 r7:eac85e60 r6:85158100 r5:8519c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac89fb0 to 0xeac89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489c040 INFO: task kworker/0:245:4277 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: cd098000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:4279 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:4279 tgid:4279 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac8dd84 r8:00000002 r7:60000113 r6:eac8dd8c r5:8519d400 r4:8519d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac8de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519d400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e086f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ecb8c r4:851ec800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ecb8c r4:85158180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519d400 r8:851581ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158180 r8:8027f5e8 r7:eac89e60 r6:85158200 r5:8519d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac8dfb0 to 0xeac8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161140 INFO: task kworker/0:246:4279 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: cdb96000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:4282 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:4282 tgid:4282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac91d84 r8:00000002 r7:60000113 r6:eac91d8c r5:8519e000 r4:8519e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac91e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851611c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519e000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0883000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ecf8c r4:851ecc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ecf8c r4:85158280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519e000 r8:851582ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158280 r8:8027f5e8 r7:eac8de60 r6:85158300 r5:8519e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac91fb0 to 0xeac91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161300 INFO: task kworker/0:247:4282 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: cde6a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:4283 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:4283 tgid:4283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac95d84 r8:00000002 r7:60000013 r6:eac95d8c r5:8519ec00 r4:8519ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8519ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851613c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ed38c r4:851ed000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ed38c r4:85158380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8519ec00 r8:851583ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158380 r8:8027f5e8 r7:eac91e60 r6:85158400 r5:8519ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac95fb0 to 0xeac95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161180 INFO: task kworker/0:248:4283 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ce294000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:4285 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:4285 tgid:4285 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac99d84 r8:00000002 r7:60000113 r6:eac99d8c r5:85199800 r4:85199800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85199800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac99e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85199800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ed78c r4:851ed400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ed78c r4:85158480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85199800 r8:851584ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158480 r8:8027f5e8 r7:eac95e60 r6:85158500 r5:85199800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac99fb0 to 0xeac99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161500 INFO: task kworker/0:249:4285 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: ce716000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:4288 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:4288 tgid:4288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac9dd84 r8:00000002 r7:60000013 r6:eac9dd8c r5:849bec00 r4:849bec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849bec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac9de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851edb8c r4:851ed800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851edb8c r4:85158580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849bec00 r8:851585ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158580 r8:8027f5e8 r7:eac99e60 r6:85158600 r5:849bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161480 INFO: task kworker/0:250:4288 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: cf212000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:4289 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:4289 tgid:4289 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaca1d84 r8:00000002 r7:60000013 r6:eaca1d8c r5:84818000 r4:84818000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84818000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84818000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0911000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851edf8c r4:851edc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851edf8c r4:85158680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84818000 r8:851586ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158680 r8:8027f5e8 r7:eac9de60 r6:85158700 r5:84818000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca1fb0 to 0xeaca1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161640 INFO: task kworker/0:251:4289 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: cf9a6000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:252:4291 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:252 state:D stack:0 pid:4291 tgid:4291 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaca5d84 r8:00000002 r7:60000013 r6:eaca5d8c r5:84818c00 r4:84818c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84818c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84818c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0951000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ee78c r4:851ee400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ee78c r4:85158780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84818c00 r8:851587ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158780 r8:8027f5e8 r7:eaca1e60 r6:85158800 r5:84818c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca5fb0 to 0xeaca5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161800 INFO: task kworker/0:252:4291 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d02e4000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:4293 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:4293 tgid:4293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaca9d84 r8:00000002 r7:60000013 r6:eaca9d8c r5:84819800 r4:84819800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84819800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaca9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84819800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e092d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ee38c r4:851ee000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ee38c r4:85158880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84819800 r8:851588ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158880 r8:8027f5e8 r7:eaca5e60 r6:85158900 r5:84819800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaca9fb0 to 0xeaca9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161800 INFO: task kworker/0:253:4293 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d02e4000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:254:4296 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:254 state:D stack:0 pid:4296 tgid:4296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacadd84 r8:00000002 r7:60000013 r6:eacadd8c r5:8481a400 r4:8481a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8481a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8481a400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e097b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eeb8c r4:851ee800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851eeb8c r4:85158980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481a400 r8:851589ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158980 r8:8027f5e8 r7:eaca5e60 r6:85158a00 r5:8481a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacadfb0 to 0xeacadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161c40 INFO: task kworker/0:254:4296 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d02e4000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:4297 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:4297 tgid:4297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac81d84 r8:00000002 r7:60000113 r6:eac81d8c r5:8481b000 r4:8481b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8481b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac81e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85173000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8481b000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ef38c r4:851ef000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ef38c r4:85158a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481b000 r8:85158aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158a80 r8:8027f5e8 r7:eacade60 r6:85158b00 r5:8481b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac81fb0 to 0xeac81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161c40 INFO: task kworker/0:255:4297 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d06ce000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:256:4298 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:256 state:D stack:0 pid:4298 tgid:4298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacb9d84 r8:00000002 r7:60000113 r6:eacb9d8c r5:8481bc00 r4:8481bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8481bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85161d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8481bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49b9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eef8c r4:851eec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851eef8c r4:85158b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481bc00 r8:85158bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158b80 r8:8027f5e8 r7:eac81e60 r6:85158c00 r5:8481bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb9fb0 to 0xeacb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85161c40 INFO: task kworker/0:256:4298 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d0a25000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:257:4300 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:4300 tgid:4300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacb5d84 r8:00000002 r7:60000113 r6:eacb5d8c r5:8481c800 r4:8481c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8481c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851731c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8481c800 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851ef78c r4:851ef400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851ef78c r4:85158c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481c800 r8:85158cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158c80 r8:8027f5e8 r7:eac81e60 r6:85158d00 r5:8481c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacb5fb0 to 0xeacb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85173100 INFO: task kworker/0:257:4300 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d0a25000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:258:4303 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:258 state:D stack:0 pid:4303 tgid:4303 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacbdd84 r8:00000002 r7:60000013 r6:eacbdd8c r5:8481d400 r4:8481d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8481d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacbde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851732c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8481d400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a77000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851efb8c r4:851ef800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851efb8c r4:85158d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481d400 r8:85158dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158d80 r8:8027f5e8 r7:eacb5e60 r6:85158e00 r5:8481d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacbdfb0 to 0xeacbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85173400 INFO: task kworker/0:258:4303 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d0d82000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:259:4305 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:259 state:D stack:0 pid:4305 tgid:4305 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacc5d84 r8:00000002 r7:60000013 r6:eacc5d8c r5:8481e000 r4:8481e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8481e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851735c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8481e000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab21000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f438c r4:851f4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f438c r4:85158e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481e000 r8:85158eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158e80 r8:8027f5e8 r7:eacbde60 r6:85158f00 r5:8481e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc5fb0 to 0xeacc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85173240 INFO: task kworker/0:259:4305 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d0d82000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:260:4306 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:260 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaccdd84 r8:00000002 r7:60000113 r6:eaccdd8c r5:85238c00 r4:85238c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85238c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaccde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851734c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa9f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851eff8c r4:851efc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851eff8c r4:85158f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85238c00 r8:85158fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85158f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85158f80 r8:8027f5e8 r7:eacc5e60 r6:851c8e00 r5:85238c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaccdfb0 to 0xeaccdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85173240 INFO: task kworker/0:260:4306 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d146b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:261:4309 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:4309 tgid:4309 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacd9d84 r8:00000002 r7:60000013 r6:eacd9d8c r5:8523a400 r4:8523a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8523a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85173900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523a400 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab59000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f4b8c r4:851f4800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f4b8c r4:851b9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523a400 r8:851b902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9000 r8:8027f5e8 r7:eacc5e60 r6:851c8e80 r5:8523a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd9fb0 to 0xeacd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85173600 INFO: task kworker/0:261:4309 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d146b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:262:4310 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:262 state:D stack:0 pid:4310 tgid:4310 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacc9d84 r8:00000002 r7:60000013 r6:eacc9d8c r5:8481ec00 r4:8481ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8481ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85173740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8481ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab3f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f478c r4:851f4400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f478c r4:851b9080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8481ec00 r8:851b90ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9080 r8:8027f5e8 r7:eacd9e60 r6:851b9100 r5:8481ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc9fb0 to 0xeacc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85173600 INFO: task kworker/0:262:4310 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d146b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:4312 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:4312 tgid:4312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacd5d84 r8:00000002 r7:60000113 r6:eacd5d8c r5:851a8000 r4:851a8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85173a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab7b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f4f8c r4:851f4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f4f8c r4:851b9180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a8000 r8:851b91ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9180 r8:8027f5e8 r7:eacd9e60 r6:851b9200 r5:851a8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd5fb0 to 0xeacd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85173a40 INFO: task kworker/0:263:4312 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d188e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:4315 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacddd84 r8:00000002 r7:60000013 r6:eacddd8c r5:851a9800 r4:851a9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851a9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacdde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85173d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaceb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f538c r4:851f5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f538c r4:851b9280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a9800 r8:851b92ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9280 r8:8027f5e8 r7:eacd5e60 r6:851b9300 r5:851a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacddfb0 to 0xeacddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851739c0 INFO: task kworker/0:264:4315 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d199a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:4317 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:4317 tgid:4317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eace5d84 r8:00000002 r7:60000113 r6:eace5d8c r5:8523b000 r4:8523b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8523b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bc540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab99000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510bf8c r4:8510bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8510bf8c r4:851b9380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523b000 r8:851b93ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9380 r8:8027f5e8 r7:eacdde60 r6:851c8f00 r5:8523b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace5fb0 to 0xeace5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85173c00 INFO: task kworker/0:265:4317 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d199a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:4318 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:4318 tgid:4318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eace9d84 r8:00000002 r7:60000013 r6:eace9d8c r5:8523bc00 r4:8523bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8523bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85173e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f578c r4:851f5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f578c r4:851b9400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523bc00 r8:851b942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9400 r8:8027f5e8 r7:eacdde60 r6:851c8f80 r5:8523bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace9fb0 to 0xeace9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851738c0 INFO: task kworker/0:266:4318 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d1e22000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:4321 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:4321 tgid:4321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacf9d84 r8:00000002 r7:60000113 r6:eacf9d8c r5:8523c800 r4:8523c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8523c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85154140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacfb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f5b8c r4:851f5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f5b8c r4:851b9480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523c800 r8:851b94ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9480 r8:8027f5e8 r7:eace9e60 r6:851cb000 r5:8523c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf9fb0 to 0xeacf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85173b40 INFO: task kworker/0:267:4321 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d1e22000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:4322 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:4322 tgid:4322 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead01d84 r8:00000002 r7:60000013 r6:ead01d8c r5:8523d400 r4:8523d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8523d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead01e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85173ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead05000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f5f8c r4:851f5c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f5f8c r4:851b9500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523d400 r8:851b952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9500 r8:8027f5e8 r7:eacf9e60 r6:851cb080 r5:8523d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead01fb0 to 0xead01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85173ec0 INFO: task kworker/0:268:4322 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d23cb000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:4325 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:4325 tgid:4325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead1dd84 r8:00000002 r7:60000113 r6:ead1dd8c r5:8523e000 r4:8523e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8523e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead1de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cae00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523e000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f6f8c r4:851f6c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f6f8c r4:851b9580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523e000 r8:851b95ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9580 r8:8027f5e8 r7:ead01e60 r6:851cb100 r5:8523e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead1dfb0 to 0xead1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851ca0c0 INFO: task kworker/0:269:4325 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d270a000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:4326 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:4326 tgid:4326 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead21d84 r8:00000002 r7:60000013 r6:ead21d8c r5:85239800 r4:85239800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85239800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead21e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85239800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead13000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f638c r4:851f6000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f638c r4:851b9600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85239800 r8:851b962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9600 r8:8027f5e8 r7:ead1de60 r6:851cb180 r5:85239800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead21fb0 to 0xead21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851ca0c0 INFO: task kworker/0:270:4326 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d2b14000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:4328 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:4328 tgid:4328 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead31d84 r8:00000002 r7:60000013 r6:ead31d8c r5:85193c00 r4:85193c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85193c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ca1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85193c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead19000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f678c r4:851f6400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f678c r4:851b9680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85193c00 r8:851b96ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9680 r8:8027f5e8 r7:ead1de60 r6:851cb200 r5:85193c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead31fb0 to 0xead31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851ca300 INFO: task kworker/0:271:4328 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d2fad000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 INFO: task kworker/0:272:4330 blocked for more than 461 seconds. r4:8486ec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead35e08 r5:00001000 r4:e07d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:8436438c r4:84364000 r4:84be5080 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:4332 blocked for more than 461 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:4332 tgid:4332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead2dd84 r8:00000002 r7:60000113 r6:ead2dd8c r5:8523ec00 r4:8523ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8523ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead2de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85154680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb49000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85110f8c r4:85110c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85110f8c r4:851cb300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8523ec00 r8:851cb32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cb300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb300 r8:8027f5e8 r7:eac6de60 r6:851cb380 r5:8523ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead2dfb0 to 0xead2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bcfc0 INFO: task kworker/1:336:4332 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d2fad000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:337:4337 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:337 state:D stack:0 pid:4337 tgid:4337 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead09d84 r8:00000002 r7:60000113 r6:ead09d8c r5:85238000 r4:85238000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85238000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85238000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc4f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511138c r4:85111000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511138c r4:851cb400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85238000 r8:851cb42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cb400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb400 r8:8027f5e8 r7:ead2de60 r6:851cb480 r5:85238000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead09fb0 to 0xead09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bb000 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:e0199000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:851cb500 r8:8027f5e8 r7:ead09e60 r6:851cb580 r5:85240000 task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d32aa000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:339:4339 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:339 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacc1d84 r8:00000002 r7:60000013 r6:eacc1d8c r5:85240c00 r4:85240c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85240c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacc1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85240c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511178c r4:85111400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511178c r4:851cb600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85240c00 r8:851cb62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cb600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb600 r8:8027f5e8 r7:eabb9e60 r6:851cb680 r5:85240c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacc1fb0 to 0xeacc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bb000 INFO: task kworker/1:339:4339 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d3cd0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:4342 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:4342 tgid:4342 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eac0dd84 r8:00000002 r7:60000113 r6:eac0dd8c r5:85241800 r4:85241800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85241800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:85111b8c r4:851cb700 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:80070013 r4:80239bb0 r5:8436438c r4:84364000 5fa0: 00000000 00000000 00000000 00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85111f8c r4:85111c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85111f8c r4:851cb800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85242400 r8:851cb82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cb800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb800 r8:8027f5e8 r7:eabb9e60 r6:851cb880 r5:85242400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead51fb0 to 0xead51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bb340 INFO: task kworker/1:341:4343 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d3cd0000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:4346 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:4346 tgid:4346 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead55d84 r8:00000002 r7:60000013 r6:ead55d8c r5:85243000 r4:85243000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85243000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead55e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85243000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511278c r4:85112400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511278c r4:851cb900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85243000 r8:851cb92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cb900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cb900 r8:8027f5e8 r7:eabb9e60 r6:851cb980 r5:85243000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead55fb0 to 0xead55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bb6c0 INFO: task kworker/1:342:4346 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d42a6000 e018f000 00000001 80239b98 7f63d000 00000001 5d60: 80230ad4 80239bb0 80070013 ffffffff r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:84be5080 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:343 state:D stack:0 pid:4348 tgid:4348 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829188dc r9:ead5dd84 r8:00000002 r7:60000013 r6:ead5dd8c r5:85243c00 r4:85243c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85243c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead5de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bb980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e022b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85112b8c r4:85112800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85112b8c r4:851cba00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85243c00 r8:851cba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cba00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cba00 r8:8027f5e8 r7:ead55e60 r6:851cba80 r5:85243c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:851bb780 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:85244800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85244800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bbd40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85244800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511338c r4:85113000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511338c r4:851cbb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85244800 r8:851cbb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cbb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cbb00 r8:8027f5e8 r7:ead5de60 r6:851cbb80 r5:85244800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead61fb0 to 0xead61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d4685000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r5:8436438c r4:84364000 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bbb00 r5:00001000 r4:e05a1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 5d20: d4ab2000 e018f000 00000001 80239b98 7f63d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:4354 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:4354 tgid:4354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead69d84 r8:00000002 r7:60000113 r6:ead69d8c r5:85246000 r4:85246000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85246000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead69e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:00001000 r4:e067d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511378c r4:85113400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511378c r4:851cbd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85246000 r8:851cbd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cbd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cbd00 r8:8027f5e8 r7:ead61e60 r6:851cbd80 r5:85246000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead69fb0 to 0xead69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bbd00 INFO: task kworker/1:346:4354 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:82ac11e4 r4:e0635dc0 r5:00001000 r4:e01b1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r4:84be4100 task:kworker/1:347 state:D stack:0 pid:4357 tgid:4357 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 r9:83018205 r8:85246c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:00001000 r4:e077b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8510bb8c r4:8510b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8510bb8c r4:851cbe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85246c00 r8:851cbe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cbe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cbe00 r8:8027f5e8 r7:ead69e60 r6:851cbe80 r5:85246c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead6dfb0 to 0xead6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bc240 INFO: task kworker/1:347:4357 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d4ab2000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:348 state:D stack:0 pid:4358 tgid:4358 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead71e08 r9:83018205 r8:85250000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85113b8c r4:85113800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85113b8c r4:851cbf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85250000 r8:851cbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cbf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cbf00 r8:8027f5e8 r7:ead6de60 r6:851cbf80 r5:85250000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead71fb0 to 0xead71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bbf40 INFO: task kworker/1:348:4358 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d4fd2000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:349 state:D stack:0 pid:4360 tgid:4360 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead75e08 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85250c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e072d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85113f8c r4:85113c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85113f8c r4:8516f000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85250c00 r8:8516f02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516f000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f000 r8:8027f5e8 r7:ead6de60 r6:8516f080 r5:85250c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead75fb0 to 0xead75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85160100 INFO: task kworker/1:349:4360 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d4fd2000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:350 state:D stack:0 pid:4362 tgid:4362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead79d84 r8:00000002 r7:60000013 r6:ead79d8c r5:85251800 r4:85251800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85251800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead79e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851602c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85251800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07b7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511c38c r4:8511c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511c38c r4:8516f100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85251800 r8:8516f12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516f100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f100 r8:8027f5e8 r7:ead6de60 r6:8516f180 r5:85251800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead79fb0 to 0xead79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 5d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0635dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:351:4364 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:351 state:D stack:0 pid:4364 tgid:4364 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead65d84 r8:00000002 r7:60000013 r6:ead65d8c r5:85253000 r4:85253000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85253000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85253000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a75000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511d38c r4:8511d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511d38c r4:8516f200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85253000 r8:8516f22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516f200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f200 r8:8027f5e8 r7:ead79e60 r6:8516f280 r5:85253000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84be5080 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:352:4365 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:352 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead85d84 r8:00000002 r7:60000013 r6:ead85d8c r5:85254800 r4:85254800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85254800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead85e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85254800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a1f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511c78c r4:8511c400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511c78c r4:8516f300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85254800 r8:8516f32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516f300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f300 r8:8027f5e8 r7:ead65e60 r6:8516f380 r5:85254800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead85fb0 to 0xead85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85160580 INFO: task kworker/1:352:4365 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 Exception stack(0xe0635d28 to 0xe0635d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:84be4100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead8de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cab40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85253c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f738c r4:851f7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851f738c r4:851b9780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85253c00 r8:851b97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9780 r8:8027f5e8 r7:ead1de60 r6:8516f400 r5:85253c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead8dfb0 to 0xead8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851ca740 INFO: task kworker/0:273:4368 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d5e90000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85256000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85140b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85256000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 r5:00001000 r4:eae91000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85256000 r8:851b982c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xead95fb0 to 0xead95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cac80 INFO: task kworker/0:274:4369 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d610b000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r5:8436438c r4:84364000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e49d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:851f778c r4:851b9880 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d63ea000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead7dd84 r8:00000002 r7:60000113 r6:ead7dd8c r5:851ab000 r4:851ab000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ab000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead7de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:851f7b8c r4:851f7800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:851ab000 r8:851b992c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 5d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 task:kworker/1:353 state:D stack:0 pid:4375 tgid:4375 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a39000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511cb8c r4:8511c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511cb8c r4:8516f580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851abc00 r8:8516f5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516f580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f580 r8:8027f5e8 r7:ead65e60 r6:851b9a00 r5:851abc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead81fb0 to 0xead81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85160c40 INFO: task kworker/1:353:4375 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d6786000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:354 state:D stack:0 pid:4377 tgid:4377 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85160f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511cf8c r4:8511cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511cf8c r4:8516f600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ac800 r8:8516f62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516f600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f600 r8:8027f5e8 r7:ead65e60 r6:851b9a80 r5:851ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada1fb0 to 0xeada1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85160c40 INFO: task kworker/1:354:4377 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 5d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:4379 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead9dd84 r8:00000002 r7:60000013 r6:ead9dd8c r5:851ad400 r4:851ad400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ad400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85174140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabdb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8511df8c r4:8511dc00 r10:61c88647 r9:851ad400 r8:8516f6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:851aec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadade08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511d78c r4:8511d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511d78c r4:8516f700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851aec00 r8:8516f72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516f700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f700 r8:8027f5e8 r7:ead9de60 r6:851b9b80 r5:851aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadadfb0 to 0xeadadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85160480 INFO: task kworker/1:356:4382 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0635d28 to 0xe0635d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e01b1000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:851a8c00 r4:829188d8 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85174040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511db8c r4:8511d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511db8c r4:8516f780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851a8c00 r8:8516f7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516f780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f780 r8:8027f5e8 r7:ead9de60 r6:851b9c00 r5:851a8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb1fb0 to 0xeadb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851606c0 INFO: task kworker/1:357:4384 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d6f27000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:358:4387 blocked for more than 462 seconds. [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85174440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85252400 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511e78c r4:8511e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511e78c r4:8516f800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85252400 r8:8516f82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516f800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f800 r8:8027f5e8 r7:ead9de60 r6:8516f880 r5:85252400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada5fb0 to 0xeada5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85174100 INFO: task kworker/1:358:4387 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0635d28 to 0xe0635d70) r4:82ac11e4 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:359 state:D stack:0 pid:4388 tgid:4388 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eabe5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511e38c r4:8511e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511e38c r4:8516f900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85255400 r8:8516f92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516f900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516f900 r8:8027f5e8 r7:eada5e60 r6:8516f980 r5:85255400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeada9fb0 to 0xeada9ff8) 9fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0635d28 to 0xe0635d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:8436438c r4:84364000 r4:00000001 Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:4390 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:4390 tgid:4390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadb9d84 r8:00000002 r7:60000113 r6:eadb9d8c r5:85248000 r4:85248000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85248000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:85248000 r8:8516fa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d20: d74a2000 e018f000 00000001 80239b98 7f63d000 00000001 r4:e0635dc0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:84be4100 task:kworker/0:277 state:D stack:0 pid:4392 tgid:4392 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadbde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85167ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85248c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08fb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8439df8c r4:8439dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439df8c r4:851b9c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85248c00 r8:851b9cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851b9c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b9c80 r8:8027f5e8 r7:ead95e60 r6:8516fb00 r5:85248c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadbdfb0 to 0xeadbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85167680 INFO: task kworker/0:277:4392 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d7706000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:361:4394 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:361 state:D stack:0 pid:4394 tgid:4394 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:829188dc r9:eadc1d84 r8:00000002 r7:60000013 r6:eadc1d8c r5:85249800 r4:00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85249800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8516fb80 r8:8027f5e8 r7:eadb9e60 r6:8516fc00 r5:85249800 task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d7913000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r5:8436438c r4:84364000 r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829188dc r9:eadc9d84 r8:00000002 r7:60000113 r6:eadc9d8c r5:8524a400 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:00001000 r4:eac1d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511f38c r4:8511f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511f38c r4:8516fc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524a400 r8:8516fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516fc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516fc80 r8:8027f5e8 r7:eadb9e60 r6:8516fd00 r5:8524a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadc9fb0 to 0xeadc9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85174740 INFO: task kworker/1:362:4396 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d7961000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84be5080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:363 state:D stack:0 pid:4397 tgid:4397 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85174ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8524b000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac2b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511f78c r4:8511f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511f78c r4:8516fd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524b000 r8:8516fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516fd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516fd80 r8:8027f5e8 r7:eadc9e60 r6:8516fe00 r5:8524b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadd1fb0 to 0xeadd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85174740 INFO: task kworker/1:363:4397 is blocked on a mutex likely owned by task kworker/1:289:3825. Workqueue: events bpf_prog_free_deferred 5d20: d7d07000 e018f000 00000001 80239b98 7f63d000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 Exception stack(0xe0635fb0 to 0xe0635ff8) Not tainted 6.15.0-syzkaller #0 r4:8524bc00 r4:00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8511fb8c r4:8511f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8511fb8c r4:8516fe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8524bc00 r8:8516feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8516fe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8516fe80 r8:8027f5e8 r7:eadd1e60 r6:8516ff00 r5:8524bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadcdfb0 to 0xeadcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85174c40 INFO: task kworker/1:364:4399 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d7e99000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac11e4 r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:365 state:D stack:0 pid:4403 tgid:4403 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 r9:83018205 r8:8524c800 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d80a9000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:366:4404 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:8524e000 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 5d20: d8161000 e018f000 00000001 80239b98 7f63d000 00000001 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:367:4406 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:367 state:D stack:0 pid:4406 tgid:4406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadd9d84 r8:00000002 r7:60000013 r6:eadd9d8c r5:8524ec00 r4:8524ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851486c0 r4:00000000 r9:83018205 r8:8524ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 r7:ddde2d80 r6:83018200 r5:8512938c r4:8514f180 Exception stack(0xeadd9fb0 to 0xeadd9ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0635d28 to 0xe0635d70) r4:82ac11e4 r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:368:4407 blocked for more than 462 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:368 state:D stack:0 pid:4407 tgid:4407 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ead0dd84 r8:00000002 r7:60000113 r6:ead0dd8c r5:85258000 r4:85258000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85258000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85258000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfef7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512878c r4:85128400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512878c r4:8514f280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85258000 r8:8514f2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514f280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514f280 r8:8027f5e8 r7:eadd9e60 r6:8514f300 r5:85258000 r4:85174f40 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8525a400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0143000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85128b8c r4:85128800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0635d28 to 0xe0635d70) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:370:4413 blocked for more than 462 seconds. r4:85259800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851485c0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:8436438c r4:84364000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:371:4415 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:371 state:D stack:0 pid:4415 tgid:4415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eacf5d84 r8:00000002 r7:60000113 r6:eacf5d8c r5:8525b000 r4:8525b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8525b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0635d28 to 0xe0635d70) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d91d4000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:84be4100 Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eade9d84 r8:00000002 r7:60000013 r6:eade9d8c r5:8525c800 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e087f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeade9fb0 to 0xeade9ff8) r4:85148b00 INFO: task kworker/1:373:4418 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d95d2000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:4421 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:4421 tgid:4421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadedd84 r8:00000002 r7:60000113 r6:eadedd8c r5:8525d400 r4:8525d400 r5:8525d400 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8525d400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: d9bac000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:84be4100 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000000 r9:83018205 r8:85258c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d60: 80230ad4 80239bb0 80070013 ffffffff [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:278 state:D stack:0 pid:4426 tgid:4426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eadf9d84 r8:00000002 r7:60000113 r6:eadf9d8c r5:8524d400 r4:8524d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8524d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 r5:8436438c r4:84364000 r4:00000001 r4:84be4100 r10:829188dc r9:eade5d84 r8:00000002 r7:60000113 r6:eade5d8c r5:84a08c00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:84a08c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49b0000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512ab8c r4:8512a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512ab8c r4:8514fb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a08c00 r8:8514fb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514fb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514fb00 r8:8027f5e8 r7:eadede60 r6:851b9d80 r5:84a08c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade5fb0 to 0xeade5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851461c0 INFO: task kworker/1:376:4427 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: da187000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:4429 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:377 state:D stack:0 pid:4429 tgid:4429 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829188dc r9:eadfdd84 r8:00000002 r7:60000013 r6:eadfdd8c r5:84a0a400 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512b78c r4:8512b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512b78c r4:8514fb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0a400 r8:8514fbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514fb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514fb80 r8:8027f5e8 r7:eade5e60 r6:851b9e00 r5:84a0a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadfdfb0 to 0xeadfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85146280 INFO: task kworker/1:377:4429 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) r5:80070013 r4:80239bb0 r4:e0635dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:378:4430 blocked for more than 463 seconds. r4:84a0b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae01e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512af8c r4:8512ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512af8c r4:8514fc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0b000 r8:8514fc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514fc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514fc00 r8:8027f5e8 r7:eadfde60 r6:851b9e80 r5:84a0b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae01fb0 to 0xeae01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85146100 INFO: task kworker/1:378:4430 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 r4:00000000 r5:8436438c r4:84364000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae05e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851465c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a0bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a0b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512b38c r4:8512b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512b38c r4:8514fc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0bc00 r8:8514fcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514fc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514fc80 r8:8027f5e8 r7:eadfde60 r6:851b9f00 r5:84a0bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae05fb0 to 0xeae05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85146400 INFO: task kworker/1:379:4433 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: da992000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8436438c r4:84364000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:84a0c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a0c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a0c800 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512bb8c r4:8512b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512bb8c r4:8514fd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0c800 r8:8514fd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514fd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514fd00 r8:8027f5e8 r7:eadfde60 r6:851b9f80 r5:84a0c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae09fb0 to 0xeae09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85146700 INFO: task kworker/1:380:4435 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: dae9f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:381:4437 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:381 state:D stack:0 pid:4437 tgid:4437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:84a0d400 r5:84a0d400 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a0d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab41000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8512bf8c r4:8512bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8512bf8c r4:8514fd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0d400 r8:8514fdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514fd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514fd80 r8:8027f5e8 r7:eae09e60 r6:8513e000 r5:84a0d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae0dfb0 to 0xeae0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85146780 INFO: task kworker/1:381:4437 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: dae9f000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:382:4439 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:382 state:D stack:0 pid:4439 tgid:4439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae11d84 r8:00000002 r7:60000013 r6:eae11d8c r5:84a0e000 r4:84a0e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a0e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851469c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a0e000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab69000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513038c r4:85130000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513038c r4:8514fe00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0e000 r8:8514fe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514fe00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514fe00 r8:8027f5e8 r7:eae0de60 r6:8513e080 r5:84a0e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae11fb0 to 0xeae11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851468c0 INFO: task kworker/1:382:4439 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: db646000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:4441 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:4441 tgid:4441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae19d84 r8:00000002 r7:60000113 r6:eae19d8c r5:84a09800 r4:84a09800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a09800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a09800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac3b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513078c r4:85130400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513078c r4:8514fe80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a09800 r8:8514feac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514fe80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514fe80 r8:8027f5e8 r7:eae11e60 r6:8513e100 r5:84a09800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae19fb0 to 0xeae19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85146a00 INFO: task kworker/1:383:4441 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: dbce3000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:384:4444 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:384 state:D stack:0 pid:4444 tgid:4444 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae25d84 r8:00000002 r7:60000013 r6:eae25d8c r5:851aa400 r4:851aa400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851aa400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae25e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85130b8c r4:85130800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85130b8c r4:8514ff00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851aa400 r8:8514ff2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514ff00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514ff00 r8:8027f5e8 r7:eae19e60 r6:8513e180 r5:851aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae25fb0 to 0xeae25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85146ac0 INFO: task kworker/1:384:4444 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: dc22e000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:385:4445 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:385 state:D stack:0 pid:4445 tgid:4445 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae29d84 r8:00000002 r7:60000113 r6:eae29d8c r5:84a08000 r4:84a08000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a08000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489c180 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a08000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac65000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513138c r4:85131000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513138c r4:8514ff80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a08000 r8:8514ffac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8514ff80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8514ff80 r8:8027f5e8 r7:eae25e60 r6:8513e200 r5:84a08000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae29fb0 to 0xeae29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85146c40 INFO: task kworker/1:385:4445 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: dc4a8000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:829188dc r9:eadf1d84 r8:00000002 r7:60000013 r6:eadf1d8c r5:8525e000 r4:8525e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8525e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadf1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85146d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8525e000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac5b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85130f8c r4:85130c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85130f8c r4:85142000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000001 task:kworker/1:388 state:D stack:0 pid:4451 tgid:4451 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae31d84 r8:00000002 r7:60000013 r6:eae31d8c r5:85260000 r4:85260000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85260000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85139040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85260000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8513178c r4:85131400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8513178c r4:85142200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85260000 r8:8514222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85142200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142200 r8:8027f5e8 r7:eae2de60 r6:85142280 r5:85260000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae31fb0 to 0xeae31ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:8436438c r4:84364000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) 5d20: dd684000 e018f000 00000001 80239b98 7f63d000 00000001 5d40: 82ac05a0 7f63d000 e018f000 8280c930 82ac11c4 e0635da4 e0635da8 e0635d78 5d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r5:85261800 r4:829188d8 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:8436438c r4:84364000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829188dc r9:eae49d84 r8:00000002 r7:60000113 r6:eae49d8c r5:85263000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Workqueue: events bpf_prog_free_deferred r4:e0635dc0 r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:85132f8c r4:85142700 Workqueue: events bpf_prog_free_deferred r4:e0635dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:394:4463 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:394 state:D stack:0 pid:4463 tgid:4463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae51d84 r8:00000002 r7:60000013 r6:eae51d8c r5:85264800 r4:85264800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85264800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae51e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85139b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85264800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae57000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Call trace: [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:4467 blocked for more than 463 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:4467 tgid:4467 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae65d84 r8:00000002 r7:60000113 r6:eae65d8c r5:85298000 r4:85298000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85298000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85139cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85298000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8513378c r4:85133400 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 Exception stack(0xe0635fb0 to 0xe0635ff8) r4:85299800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85139ec0 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000000 r4:e0635dc0 r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 INFO: task kworker/1:398:4471 blocked for more than 463 seconds. [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae11c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85298c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae77000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d038c r4:852d0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d038c r4:85142c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85298c00 r8:85142c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85142c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142c00 r8:8027f5e8 r7:eae41e60 r6:85142c80 r5:85298c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae81fb0 to 0xeae81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae1240 INFO: task kworker/1:398:4471 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7c800 r8:80200be4 r7:e0635d5c r6:ffffffff r5:84b7c800 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0635d28 to 0xe0635d70) r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:399:4473 blocked for more than 463 seconds. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1440 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000000 r4:00000000 r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:829188dc r9:eae95d84 r8:00000002 r7:60000113 r6:eae95d8c r5:8529b000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529b000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb7f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d0b8c r4:852d0800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d0b8c r4:85142e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529b000 r8:85142e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85142e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142e00 r8:8027f5e8 r7:eae89e60 r6:85142e80 r5:8529b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae95fb0 to 0xeae95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae10c0 INFO: task kworker/1:400:4475 is blocked on a mutex likely owned by task kworker/1:289:3825. r4:82ac11e4 r5:8436438c r4:84364000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfd91000 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85140b40 INFO: task kworker/0:280:4479 is blocked on a mutex likely owned by task kworker/1:289:3825. task:kworker/1:289 state:R running task stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a625f4>] (preempt_schedule_common kernel/sched/core.c:6961 [inline]) [<81a614d4>] (__schedule) from [<81a625f4>] (preempt_schedule+0x4c/0xb4 kernel/sched/core.c:6985) r10:00000000 r9:20070013 r8:829188dc r7:81a63dd0 r6:00000001 r5:84b7c800 r4:81a63dd0 [<81a625a8>] (preempt_schedule) from [<81a63dd0>] (class_preempt_destructor include/linux/preempt.h:481 [inline]) [<81a625a8>] (preempt_schedule) from [<81a63dd0>] (raw_spin_unlock_irqrestore_wake include/linux/sched/wake_q.h:93 [inline]) [<81a625a8>] (preempt_schedule) from [<81a63dd0>] (__mutex_unlock_slowpath.constprop.0+0x1c0/0x1c8 kernel/locking/mutex.c:949) r7:84b7c800 r6:84b7bc00 r5:00000000 r4:829188d8 [<81a63c10>] (__mutex_unlock_slowpath.constprop.0) from [<81a63e18>] (mutex_unlock+0x40/0x44 kernel/locking/mutex.c:539) r9:00000000 r8:00000000 r7:ffffffff r6:e0635dc0 r5:e0635e08 r4:e0635dc0 [<81a63dd8>] (mutex_unlock) from [<804e3330>] (_vm_unmap_aliases+0x208/0x240 mm/vmalloc.c:2933) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436438c r4:84364000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436438c r4:84be5080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7c800 r8:84be50ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5080 r8:8027f5e8 r7:e0631e60 r6:84be5100 r5:84b7c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eaea1d84 r8:00000002 r7:60000113 r6:eaea1d8c r5:848f2400 r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e000f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d138c r4:852d1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d138c r4:85142f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f2400 r8:85142f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85142f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142f00 r8:8027f5e8 r7:eae95e60 r6:8513e480 r5:848f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea1fb0 to 0xeaea1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae1900 INFO: task kworker/1:401:4481 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 7fb78000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:402:4483 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:402 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaeb1d84 r8:00000002 r7:60000113 r6:eaeb1d8c r5:848f3000 r4:848f3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848f3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeb1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e014b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d178c r4:852d1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d178c r4:85142f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f3000 r8:85142fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85142f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85142f80 r8:8027f5e8 r7:eaea1e60 r6:8513e500 r5:848f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeb1fb0 to 0xeaeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae1a80 INFO: task kworker/1:402:4483 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 7fed7000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:4486 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:4486 tgid:4486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaeadd84 r8:00000002 r7:60000013 r6:eaeadd8c r5:848f3c00 r4:848f3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848f3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1ec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0207000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d1b8c r4:852d1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d1b8c r4:850ef000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f3c00 r8:850ef02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef000 r8:8027f5e8 r7:eaeb1e60 r6:8513e580 r5:848f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeadfb0 to 0xeaeadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae1b40 INFO: task kworker/1:403:4486 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8047e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:404:4489 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:404 state:D stack:0 pid:4489 tgid:4489 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaec1d84 r8:00000002 r7:60000113 r6:eaec1d8c r5:848f6000 r4:848f6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848f6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e027f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d1f8c r4:852d1c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d1f8c r4:850ef080 r10:61c88647 r9:848f6000 r8:850ef0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:405 state:D stack:0 pid:4491 tgid:4491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaec5d84 r8:00000002 r7:60000113 r6:eaec5d8c r5:848f4800 r4:848f4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848f4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ee040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f4800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0745000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8522938c r4:85229000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8522938c r4:850ef100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f4800 r8:850ef12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef100 r8:8027f5e8 r7:eaec1e60 r6:8513e680 r5:848f4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec5fb0 to 0xeaec5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84ae1f40 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r4:e0631dc0 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0631fb0 to 0xe0631ff8) r4:84be4100 task:kworker/1:406 state:D stack:0 pid:4492 tgid:4492 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaec9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ec040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848f6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0663000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d238c r4:852d2000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d238c r4:850ef180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f6c00 r8:850ef1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef180 r8:8027f5e8 r7:eaec5e60 r6:8513e700 r5:848f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaec9fb0 to 0xeaec9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ec0c0 INFO: task kworker/1:406:4492 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eaebdd84 r8:00000002 r7:60000113 r6:eaebdd8c r5:848f5400 r4:848f5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:848f5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaebde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ee7c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a0d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85229b8c r4:85229800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85229b8c r4:8513e780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:848f5400 r8:8513e7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8513e780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513e780 r8:8027f5e8 r7:eae55e60 r6:8513e800 r5:848f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaebdfb0 to 0xeaebdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ee080 INFO: task kworker/0:281:4495 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 815c1000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r4:00000001 r4:84be4100 r4:848f0c00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ec200 INFO: task kworker/1:407:4497 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 81739000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:408:4498 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eaed1d84 r8:00000002 r7:60000013 r6:eaed1d8c r5:84a0ec00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e078f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d278c r4:852d2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d278c r4:850ef280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a0ec00 r8:850ef2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef280 r8:8027f5e8 r7:eaecde60 r6:8513e900 r5:84a0ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed1fb0 to 0xeaed1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ec140 INFO: task kworker/1:408:4498 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 82146000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:4500 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:4500 tgid:4500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0899000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84950000 r8:8513e9ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:409:4501 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:409 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaeddd84 r8:00000002 r7:60000013 r6:eaeddd8c r5:84950c00 r4:84950c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84950c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaedde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ecf40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84950c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac25000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d378c r4:852d3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d378c r4:850ef300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84950c00 r8:850ef32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef300 r8:8027f5e8 r7:eaecde60 r6:8513ea80 r5:84950c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeddfb0 to 0xeaeddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ec3c0 INFO: task kworker/1:409:4501 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0631dc0 r5:00001000 r4:e01cf000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee1e08 r5:00001000 r4:e8a55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d338c r4:852d3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d338c r4:850ef380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84951800 r8:850ef3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef380 r8:8027f5e8 r7:eaedde60 r6:8513eb00 r5:84951800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee1fb0 to 0xeaee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ec3c0 INFO: task kworker/1:410:4502 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 82b9d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:283:4505 blocked for more than 464 seconds. task:kworker/0:283 state:D stack:0 pid:4505 tgid:4505 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84952400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeaeb5fb0 to 0xeaeb5ff8) INFO: task kworker/0:283:4505 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8a73000 r7:dddced80 r6:83018000 r5:85229f8c r4:8513ec80 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:285:4511 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:285 state:D stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaee9d84 r8:00000002 r7:60000013 r6:eaee9d8c r5:84953c00 r4:84953c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84953c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaee9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eeb40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84953c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8522a38c r4:8522a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522a38c r4:8513ed80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84953c00 r8:8513edac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8513ed80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513ed80 r8:8027f5e8 r7:eaee5e60 r6:8513ee00 r5:84953c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaee9fb0 to 0xeaee9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850eec80 INFO: task kworker/0:285:4511 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84be4100 Workqueue: events bpf_prog_free_deferred r5:84954800 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eabd1000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8513ee80 r8:8027f5e8 r7:eaee9e60 r6:8513ef00 r5:84954800 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85140980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84955400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabfb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8522af8c r4:8522ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522af8c r4:8513ef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84955400 r8:8513efac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8513ef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513ef80 r8:8027f5e8 r7:eaeede60 r6:8513c000 r5:84955400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef1fb0 to 0xeaef1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850eecc0 INFO: task kworker/0:287:4514 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 83cd6000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:411:4515 blocked for more than 464 seconds. r10:829188dc r9:eaeb9d84 r8:00000002 r7:60000013 r6:eaeb9d8c r5:84956000 r4:00000000 r4:00000000 r5:00001000 r4:eac43000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:852d3b8c r4:850ef480 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:288:4517 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:4517 tgid:4517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaef5d84 r8:00000002 r7:60000113 r6:eaef5d8c r5:84956c00 r4:84956c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84956c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eef00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84956c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabeb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8522ab8c r4:8522a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522ab8c r4:8513c100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84956c00 r8:8513c12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8513c100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c100 r8:8027f5e8 r7:eaef1e60 r6:8513c180 r5:84956c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef5fb0 to 0xeaef5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ee2c0 INFO: task kworker/0:288:4517 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8494a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8436478c r4:84364400 r4:8494cf80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:289 state:D stack:0 pid:4520 tgid:4520 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef9e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85208000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead29000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8522bf8c r4:8522bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8522bf8c r4:8513c280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85208000 r8:8513c2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8513c280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c280 r8:8027f5e8 r7:eaef1e60 r6:8513c300 r5:85208000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaef9fb0 to 0xeaef9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85159080 INFO: task kworker/0:289:4520 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:290:4522 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:290 state:D stack:0 pid:4522 tgid:4522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaefdd84 r8:00000002 r7:60000113 r6:eaefdd8c r5:85208c00 r4:85208c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85208c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaefde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85159000 r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac15000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:290:4522 is blocked on a mutex likely owned by task kworker/1:288:3824. 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:412:4525 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:412 state:D stack:0 pid:4525 tgid:4525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eae1dd84 r8:00000002 r7:60000113 r6:eae1dd8c r5:85209800 r4:85209800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85209800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae1de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850ecb00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85209800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0215000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852d838c r4:852d8000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:412:4525 is blocked on a mutex likely owned by task kworker/1:288:3824. 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0631fb0 to 0xe0631ff8) Not tainted 6.15.0-syzkaller #0 r4:8520a400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae9de08 r5:00001000 r4:df9f5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852d3f8c r4:852d3c00 r10:00000000 r9:850ef580 r8:8027f5e8 r7:eae1de60 r6:8513c480 r5:8520a400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ece40 INFO: task kworker/1:413:4527 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 855cd000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:414:4529 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:414 state:D stack:0 pid:4529 tgid:4529 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829188dc r9:eaea9d84 r8:00000002 r7:60000013 r6:eaea9d8c r5:8520b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea9e08 r9:83018205 r8:8520b000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:00001000 r4:dfa97000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:850ef600 r8:8027f5e8 r7:eae1de60 r6:8513c500 r5:8520b000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ec700 INFO: task kworker/1:414:4529 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 85833000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:415 state:D stack:0 pid:4531 tgid:4531 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8520c800 r4:829188d8 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85148ec0 r5:00001000 r4:e0827000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d878c r4:852d8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d878c r4:850ef680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520c800 r8:850ef6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef680 r8:8027f5e8 r7:eae1de60 r6:8513c580 r5:8520c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf05fb0 to 0xeaf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850eca40 INFO: task kworker/1:415:4531 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 85b33000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r5:8520e000 r4:829188d8 r4:00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84359dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520e000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab97000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531d38c r4:8531d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8531d38c r4:8513c600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520e000 r8:8513c62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8513c600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8513c600 r8:8027f5e8 r7:eaef9e60 r6:8513c680 r5:8520e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf0dfb0 to 0xeaf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85159780 INFO: task kworker/0:291:4533 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 85b33000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:416:4534 blocked for more than 464 seconds. task:kworker/1:416 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8520bc00 r5:8520bc00 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf11e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8520bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a7d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852da38c r4:852da000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852da38c r4:850ef700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520bc00 r8:850ef72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef700 r8:8027f5e8 r7:eaf05e60 r6:8513c700 r5:8520bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf11fb0 to 0xeaf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850ec000 INFO: task kworker/1:416:4534 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 86591000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:4536 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:4536 tgid:4536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf19d84 r8:00000002 r7:60000113 r6:eaf19d8c r5:8520d400 r4:8520d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8520d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f0c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8520d400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0867000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d8b8c r4:852d8800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d8b8c r4:850ef780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8520d400 r8:850ef7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef780 r8:8027f5e8 r7:eaf11e60 r6:8513c780 r5:8520d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf19fb0 to 0xeaf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515f000 INFO: task kworker/1:417:4536 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 86591000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:418:4539 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:418 state:D stack:0 pid:4539 tgid:4539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf21d84 r8:00000002 r7:60000113 r6:eaf21d8c r5:852a0000 r4:852a0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf21e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f200 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d8f8c r4:852d8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d8f8c r4:850ef800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a0000 r8:850ef82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef800 r8:8027f5e8 r7:eaf11e60 r6:8513c800 r5:852a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf21fb0 to 0xeaf21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515f1c0 INFO: task kworker/1:418:4539 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 86e19000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:4540 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:4540 tgid:4540 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf25d84 r8:00000002 r7:60000113 r6:eaf25d8c r5:852a0c00 r4:852a0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf25e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0905000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d938c r4:852d9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d938c r4:850ef880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a0c00 r8:850ef8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef880 r8:8027f5e8 r7:eaf11e60 r6:8513c880 r5:852a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf25fb0 to 0xeaf25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515f1c0 INFO: task kworker/1:419:4540 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 86e19000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:420:4542 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred r5:852a2400 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e093f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d978c r4:852d9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d978c r4:850ef900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a2400 r8:850ef92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef900 r8:8027f5e8 r7:eaf11e60 r6:8513c900 r5:852a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf2dfb0 to 0xeaf2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515f500 INFO: task kworker/1:420:4542 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 871c6000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:421:4544 blocked for more than 464 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:421 state:D stack:0 pid:4544 tgid:4544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf35d84 r8:00000002 r7:60000113 r6:eaf35d8c r5:852a1800 r4:852a1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf35e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515f600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49b2000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d9b8c r4:852d9800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d9b8c r4:850ef980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a1800 r8:850ef9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850ef980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850ef980 r8:8027f5e8 r7:eaf11e60 r6:8513c980 r5:852a1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf35fb0 to 0xeaf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515f3c0 INFO: task kworker/1:421:4544 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 871c6000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:422:4546 blocked for more than 465 seconds. task:kworker/1:422 state:D stack:0 pid:4546 tgid:4546 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:852a3000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:852a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 r5:00001000 r4:e49f3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852d9f8c r4:852d9c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852d9f8c r4:850efa00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a3000 r8:850efa2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850efa00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efa00 r8:8027f5e8 r7:eaf11e60 r6:8513ca00 r5:852a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf3dfb0 to 0xeaf3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515f840 INFO: task kworker/1:422:4546 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 87776000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:852a5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf45e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515fbc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852daf8c r4:852dac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852daf8c r4:850efa80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a5400 r8:850efaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850efa80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efa80 r8:8027f5e8 r7:eaf11e60 r6:8513ca80 r5:852a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf45fb0 to 0xeaf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515f900 INFO: task kworker/1:423:4548 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 87776000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:424 state:D stack:0 pid:4550 tgid:4550 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab35000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852da78c r4:852da400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852da78c r4:850efb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a6000 r8:850efb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850efb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efb00 r8:8027f5e8 r7:eaf45e60 r6:8513cb00 r5:852a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf4dfb0 to 0xeaf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515f800 INFO: task kworker/1:424:4550 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 87d02000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 Workqueue: events bpf_prog_free_deferred r5:852a3c00 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eab7d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dab8c r4:852da800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852dab8c r4:850efb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a3c00 r8:850efbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850efb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efb80 r8:8027f5e8 r7:eaf45e60 r6:8513cb80 r5:852a3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf55fb0 to 0xeaf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515fc00 INFO: task kworker/1:425:4552 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 87d02000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8515fe40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852db78c r4:852db400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852db78c r4:850efc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a4800 r8:850efc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850efc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efc00 r8:8027f5e8 r7:eaf45e60 r6:8513cc00 r5:852a4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf5dfb0 to 0xeaf5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515fb40 INFO: task kworker/1:426:4554 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) Not tainted 6.15.0-syzkaller #0 r4:85280000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 r9:83018205 r8:85280000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 r5:00001000 r4:eac5d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852db38c r4:852db000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852db38c r4:850efc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85280000 r8:850efcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850efc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efc80 r8:8027f5e8 r7:eaf5de60 r6:8513cc80 r5:85280000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf65fb0 to 0xeaf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515fac0 INFO: task kworker/1:427:4556 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8861f000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eaced000 r7:ddde2d80 r6:83018200 r5:852dbb8c r4:850efd00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf71fb0 to 0xeaf71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8515fe80 INFO: task kworker/1:428:4559 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 88b7a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ead0f000 r5:852dbf8c r4:852dbc00 r10:61c88647 r9:85281800 r8:850efdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850efd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850efd80 r8:8027f5e8 r7:eaf71e60 r6:8513cd80 r5:85281800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf79fb0 to 0xeaf79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae1740 INFO: task kworker/1:429:4561 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:430 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf7de08 r5:00001000 r4:ead41000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:852dc38c r4:850efe00 Exception stack(0xeaf7dfb0 to 0xeaf7dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae1740 INFO: task kworker/1:430:4562 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 894cb000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf15e08 r5:00001000 r4:dff7b000 r7:dddced80 r6:83018000 r5:8439e78c r4:8513ce80 INFO: task kworker/0:292:4565 is blocked on a mutex likely owned by task kworker/1:288:3824. r4:00000000 r4:8494cf80 r4:84be4100 r5:85284800 r4:829188d8 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:850efe80 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:4568 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:432 state:D stack:0 pid:4568 tgid:4568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829188dc r9:eaf85d84 r8:00000002 r7:60000013 r6:eaf85d8c r5:85285400 r5:00001000 r4:ead89000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:4570 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:4570 tgid:4570 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf89e08 r5:00001000 r4:eae21000 r7:ddde2d80 r6:83018200 r5:852dcf8c r4:850eff80 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8a4db000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:435:4575 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:435 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf95d84 r8:00000002 r7:60000113 r6:eaf95d8c r5:8520ec00 r4:00000000 r5:00001000 r4:eae61000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8520ec00 r8:8497c02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:8494cf80 r4:84be4100 r10:829188dc r9:eafa1d84 r8:00000002 r7:60000013 r6:eafa1d8c r5:84888c00 r9:83018205 r8:84888c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8436478c r4:84364400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84889800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae73000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ddb8c r4:852dd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ddb8c r4:8497c100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84889800 r8:8497c12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497c100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497c100 r8:8027f5e8 r7:eafa1e60 r6:8494f280 r5:84889800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa5fb0 to 0xeafa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850124c0 INFO: task kworker/1:437:4579 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) r4:e0631dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:852ddf8c r4:852ddc00 Exception stack(0xeafb1fb0 to 0xeafb1ff8) Exception stack(0xe0631d28 to 0xe0631d70) r5:00001000 r4:e01cf000 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:00001000 r4:eafb7000 r10:61c88647 r9:8488a400 r8:8497c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497c200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497c200 r8:8027f5e8 r7:eafa1e60 r6:8494f380 r5:8488a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb5fb0 to 0xeafb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85012640 INFO: task kworker/1:439:4583 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8b53c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84be4100 r10:829188dc r9:eafc9d84 r8:00000002 r7:60000113 r6:eafc9d8c r5:8488b000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8488b000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852deb8c r4:852de800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852deb8c r4:8497c280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8488b000 r8:8497c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85012a40 Exception stack(0xe0631d28 to 0xe0631d70) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84be4100 r5:8488c800 r4:829188d8 r9:83018205 r8:8488c800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852df38c r4:852df000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852df38c r4:8497c300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8488c800 r8:8497c32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497c300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497c300 r8:8027f5e8 r7:eafc9e60 r6:8494f480 r5:8488c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafcdfb0 to 0xeafcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85012b00 INFO: task kworker/1:441:4587 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:e0631dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) r4:84be4100 task:kworker/1:442 state:D stack:0 pid:4588 tgid:4588 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829188dc r9:eafadd84 r8:00000002 r7:60000013 r6:eafadd8c r5:8529e000 r4:8529e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529e000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafcf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852def8c r4:852dec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852def8c r4:8497c380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529e000 r8:8497c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497c380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497c380 r8:8027f5e8 r7:eafcde60 r6:8497c400 r5:8529e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafadfb0 to 0xeafadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85012b00 INFO: task kworker/1:442:4588 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8bc71000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:443:4592 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:443 state:D stack:0 pid:4592 tgid:4592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf09d84 r8:00000002 r7:60000013 r6:eaf09d8c r5:8529a400 r4:8529a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84879000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852df78c r4:852df400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852df78c r4:8497c480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529a400 r8:8497c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497c480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497c480 r8:8027f5e8 r7:eafcde60 r6:8497c500 r5:8529a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf09fb0 to 0xeaf09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84879100 INFO: task kworker/1:443:4592 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8bfb5000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:444:4593 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:444 state:D stack:0 pid:4593 tgid:4593 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eafe9d84 r8:00000002 r7:60000113 r6:eafe9d8c r5:8529d400 r4:8529d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848796c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529d400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0225000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dff8c r4:852dfc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852dff8c r4:8497c580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529d400 r8:8497c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497c580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497c580 r8:8027f5e8 r7:eaf09e60 r6:8497c600 r5:8529d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe9fb0 to 0xeafe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84879280 INFO: task kworker/1:444:4593 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8c0d4000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:4596 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:4596 tgid:4596 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaff1d84 r8:00000002 r7:60000013 r6:eaff1d8c r5:851ae000 r4:851ae000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:851ae000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848794c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:851ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0083000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852dfb8c r4:852df800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852dfb8c r4:8497c680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:851ae000 r8:8497c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497c680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497c680 r8:8027f5e8 r7:eafe9e60 r6:8497c700 r5:851ae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff1fb0 to 0xeaff1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84879480 INFO: task kworker/1:445:4596 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8c4a2000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:4599 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:4599 tgid:4599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaff5d84 r8:00000002 r7:60000013 r6:eaff5d8c r5:8529c800 r4:8529c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84879980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529c800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e078c r4:852e0400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e078c r4:8497c780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529c800 r8:8497c7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497c780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497c780 r8:8027f5e8 r7:eafe9e60 r6:8497c800 r5:8529c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff5fb0 to 0xeaff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84879400 INFO: task kworker/1:446:4599 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8c4a2000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:293:4600 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:293 state:D stack:0 pid:4600 tgid:4600 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf75d84 r8:00000002 r7:60000113 r6:eaf75d8c r5:8488d400 r4:8488d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8488d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf75e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848d5400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8488d400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8439e38c r4:8439e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439e38c r4:8494f500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8488d400 r8:8494f52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8494f500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494f500 r8:8027f5e8 r7:eaf0de60 r6:8494f580 r5:8488d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf75fb0 to 0xeaf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850eacc0 INFO: task kworker/0:293:4600 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8c968000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:447:4601 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:447 state:D stack:0 pid:4601 tgid:4601 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eafe5d84 r8:00000002 r7:60000013 r6:eafe5d8c r5:8488e000 r4:8488e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8488e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848798c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8488e000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e038c r4:852e0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e038c r4:8497ca00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8488e000 r8:8497ca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497ca00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497ca00 r8:8027f5e8 r7:eaff5e60 r6:8494f600 r5:8488e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe5fb0 to 0xeafe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84879880 INFO: task kworker/1:447:4601 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8ce3c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:4604 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:4604 tgid:4604 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaff9d84 r8:00000002 r7:60000013 r6:eaff9d8c r5:8488ec00 r4:8488ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8488ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84879c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8488ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e0f8c r4:852e0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e0f8c r4:8497ca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8488ec00 r8:8497caac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497ca80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497ca80 r8:8027f5e8 r7:eaff5e60 r6:8494f680 r5:8488ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff9fb0 to 0xeaff9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84879a00 INFO: task kworker/1:448:4604 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8ce3c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:449:4605 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:449 state:D stack:0 pid:4605 tgid:4605 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:84888000 r4:84888000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84888000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84879b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84888000 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e078d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e0b8c r4:852e0800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e0b8c r4:8497cb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84888000 r8:8497cbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497cb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497cb80 r8:8027f5e8 r7:eaff9e60 r6:8494f700 r5:84888000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaffdfb0 to 0xeaffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84879c80 INFO: task kworker/1:449:4605 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8d239000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:4608 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:4608 tgid:4608 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb001d84 r8:00000002 r7:60000013 r6:eb001d8c r5:852a6c00 r4:852a6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb001e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabc7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e1b8c r4:852e1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e1b8c r4:8497cb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a6c00 r8:8497cb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497cb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497cb00 r8:8027f5e8 r7:eaff9e60 r6:8494f780 r5:852a6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb001fb0 to 0xeb001ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84879b40 INFO: task kworker/1:450:4608 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8d239000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:451:4610 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:451 state:D stack:0 pid:4610 tgid:4610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb005d84 r8:00000002 r7:60000113 r6:eb005d8c r5:85280c00 r4:85280c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85280c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84879d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85280c00 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e138c r4:852e1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e138c r4:8497cc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85280c00 r8:8497cc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497cc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497cc00 r8:8027f5e8 r7:eb001e60 r6:8494f800 r5:85280c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84879d80 INFO: task kworker/1:451:4610 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8d6e8000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:452:4611 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:452 state:D stack:0 pid:4611 tgid:4611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb009d84 r8:00000002 r7:60000013 r6:eb009d8c r5:85348000 r4:85348000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85348000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb009e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85012fc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85348000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a43000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e178c r4:852e1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e178c r4:8497cc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85348000 r8:8497ccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497cc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497cc80 r8:8027f5e8 r7:eb001e60 r6:8494f880 r5:85348000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb009fb0 to 0xeb009ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80070013 ffffffff r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:294:4614 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:294 state:D stack:0 pid:4614 tgid:4614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eafedd84 r8:00000002 r7:60000113 r6:eafedd8c r5:85348c00 r4:85348c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85348c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84359300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85348c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531c38c r4:8531c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8531c38c r4:8494f900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85348c00 r8:8494f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8494f900 Exception stack(0xeafedfb0 to 0xeafedff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8d973000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8494cf80 Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:453:4615 blocked for more than 465 seconds. r10:829188dc r9:eb011d84 r8:00000002 r7:60000113 r6:eb011d8c r5:85349800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eabe3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e1f8c r4:852e1c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e1f8c r4:8497cd00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85349800 r8:8497cd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497cd00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497cd00 r8:8027f5e8 r7:eb001e60 r6:8494fa00 r5:85349800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb011fb0 to 0xeb011ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84879f80 INFO: task kworker/1:453:4615 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:454 state:D stack:0 pid:4618 tgid:4618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb015d84 r8:00000002 r7:60000113 r6:eb015d8c r5:8534a400 r4:8534a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8534a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb015e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab6300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534a400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac23000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e278c r4:852e2400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e278c r4:8497cd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534a400 r8:8497cdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497cd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497cd80 r8:8027f5e8 r7:eb011e60 r6:8494fa80 r5:8534a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb015fb0 to 0xeb015ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6100 INFO: task kworker/1:454:4618 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8e379000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:455:4619 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:455 state:D stack:0 pid:4619 tgid:4619 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb019d84 r8:00000002 r7:60000113 r6:eb019d8c r5:8534b000 r5:8534b000 r4:829188d8 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab6280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534b000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac03000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e238c r4:852e2000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e238c r4:8497ce00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534b000 r8:8497ce2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497ce00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497ce00 r8:8027f5e8 r7:eb015e60 r6:8494fb00 r5:8534b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb019fb0 to 0xeb019ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6100 INFO: task kworker/1:455:4619 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8e467000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8494cf80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:456 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac45000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e2b8c r4:852e2800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e2b8c r4:8497ce80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534bc00 r8:8497ceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497ce80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497ce80 r8:8027f5e8 r7:eb015e60 r6:8494fb80 r5:8534bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6100 INFO: task kworker/1:456:4622 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8e9be000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:457:4624 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:457 state:D stack:0 pid:4624 tgid:4624 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb031d84 r8:00000002 r7:60000113 r6:eb031d8c r5:8534c800 r4:8534c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8534c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb031e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab6840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534c800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb041000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e378c r4:852e3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e378c r4:8497cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534c800 r8:8497cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497cf80 r8:8027f5e8 r7:eb025e60 r6:8494fc00 r5:8534c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb031fb0 to 0xeb031ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6480 INFO: task kworker/1:457:4624 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8ec0d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:458:4625 blocked for more than 465 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:458 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb035d84 r8:00000002 r7:60000113 r6:eb035d8c r5:8534e000 r4:8534e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8534e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab6500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534e000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e2f8c r4:852e2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e2f8c r4:8497cf00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534e000 r8:8497cf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497cf00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497cf00 r8:8027f5e8 r7:eb031e60 r6:8494fc80 r5:8534e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb035fb0 to 0xeb035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6480 INFO: task kworker/1:458:4625 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8ee86000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:4627 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:4627 tgid:4627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb045d84 r8:00000002 r7:60000113 r6:eb045d8c r5:8534d400 r4:8534d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8534d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb045e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab6640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534d400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e338c r4:852e3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e338c r4:8497c980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534d400 r8:8497c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497c980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497c980 r8:8027f5e8 r7:eb031e60 r6:8494fd00 r5:8534d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb045fb0 to 0xeb045ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6800 INFO: task kworker/1:459:4627 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8f0d0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:4629 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:4629 tgid:4629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb051d84 r8:00000002 r7:60000013 r6:eb051d8c r5:83ac8c00 r4:83ac8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84879040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb089000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e4f8c r4:852e4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e4f8c r4:8497c880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac8c00 r8:8497c8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497c880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497c880 r8:8027f5e8 r7:eb031e60 r6:8494fd80 r5:83ac8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb051fb0 to 0xeb051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6600 INFO: task kworker/1:460:4629 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8f387000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:461:4631 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:461 state:D stack:0 pid:4631 tgid:4631 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb061d84 r8:00000002 r7:60000113 r6:eb061d8c r5:83ac8000 r4:83ac8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab6940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac8000 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb057000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e3b8c r4:852e3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e3b8c r4:8497c900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac8000 r8:8497c92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8497c900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8497c900 r8:8027f5e8 r7:eb051e60 r6:8494fe00 r5:83ac8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb061fb0 to 0xeb061ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6a80 INFO: task kworker/1:461:4631 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8f5f6000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:462:4633 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:462 state:D stack:0 pid:4633 tgid:4633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb06dd84 r8:00000002 r7:60000113 r6:eb06dd8c r5:83ac9800 r4:83ac9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ac9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab6ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac9800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb05d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e3f8c r4:852e3c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e3f8c r4:84914000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ac9800 r8:8491402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914000 r8:8027f5e8 r7:eb051e60 r6:8494fe80 r5:83ac9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6980 INFO: task kworker/1:462:4633 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8f948000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:463:4635 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:463 state:D stack:0 pid:4635 tgid:4635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb079d84 r8:00000002 r7:60000113 r6:eb079d8c r5:83acb000 r4:83acb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83acb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb079e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab6c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83acb000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb06f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e438c r4:852e4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e438c r4:84914080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83acb000 r8:849140ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914080 r8:8027f5e8 r7:eb051e60 r6:8494ff00 r5:83acb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb079fb0 to 0xeb079ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6d80 INFO: task kworker/1:463:4635 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 8fbc0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 Exception stack(0xe0631fb0 to 0xe0631ff8) task:kworker/1:464 state:D stack:0 pid:4638 tgid:4638 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb075000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:83acbc00 r8:8491412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:83acd400 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb095e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab6f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83acd400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb07f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e4b8c r4:852e4800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e4b8c r4:84914180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83acd400 r8:849141ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914180 r8:8027f5e8 r7:eb051e60 r6:84aec000 r5:83acd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb095fb0 to 0xeb095ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:466 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb065fb0 to 0xeb065ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab6e40 INFO: task kworker/1:466:4641 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 901e3000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:4644 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:4644 tgid:4644 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb08dd84 r8:00000002 r7:60000013 r6:eb08dd8c r5:852a8000 r4:852a8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb08de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8487e340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e5b8c r4:852e5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e5b8c r4:84914300 r10:61c88647 r9:852a8000 r8:8491432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eb0a1d84 r8:00000002 r7:60000113 r6:eb0a1d8c r5:852a8c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb09d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0631dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:469:4648 blocked for more than 466 seconds. r4:852aa400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb01de08 r4:00000000 r5:00001000 r4:dfcc3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852e638c r4:852e6000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e638c r4:84914500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852aa400 r8:8491452c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914500 r8:8027f5e8 r7:eb08de60 r6:84914580 r5:852aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb01dfb0 to 0xeb01dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487e300 INFO: task kworker/1:469:4648 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 90b70000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:295:4650 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:295 state:D stack:0 pid:4650 tgid:4650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb0a9d84 r8:00000002 r7:60000113 r6:eb0a9d8c r5:83ace000 r4:83ace000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ace000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84359400 r5:00001000 r4:eb0bb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8531c78c r4:8531c400 r10:61c88647 r9:83ace000 r8:84aec0ac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:470 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:dfa2b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fa0: 00000000 00000000 00000000 00000000 [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:296:4653 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:296 state:D stack:0 pid:4653 tgid:4653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb0d9d84 r8:00000002 r7:60000113 r6:eb0d9d8c r5:83acc800 r4:83acc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83acc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84359c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83acc800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e090b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531cf8c r4:8531cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8531cf8c r4:84aec200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83acc800 r8:84aec22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec200 r8:8027f5e8 r7:eaf0de60 r6:84aec280 r5:83acc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84359540 INFO: task kworker/0:296:4653 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 917c9000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:471:4656 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:471 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf69d84 r8:00000002 r7:60000013 r6:eaf69d8c r5:83aca400 r4:83aca400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83aca400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf69e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8487e6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83aca400 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e012f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e678c r4:852e6400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e678c r4:84914680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83aca400 r8:849146ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914680 r8:8027f5e8 r7:eb01de60 r6:84aec300 r5:83aca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf69fb0 to 0xeaf69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487e780 INFO: task kworker/1:471:4656 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 91ecc000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:472:4658 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:472 state:D stack:0 pid:4658 tgid:4658 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf99d84 r8:00000002 r7:60000113 r6:eaf99d8c r5:8529ec00 r4:8529ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8529ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf99e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8487edc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8529ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a53000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e738c r4:852e7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e738c r4:84914700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8529ec00 r8:8491472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914700 r8:8027f5e8 r7:eaf69e60 r6:84aec380 r5:8529ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf99fb0 to 0xeaf99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487e900 INFO: task kworker/1:472:4658 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 91ecc000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:473:4659 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:473 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eafc1d84 r8:00000002 r7:60000013 r6:eafc1d8c r5:8534ec00 r4:8534ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8534ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8487e9c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8534ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0839000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e6b8c r4:852e6800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e6b8c r4:84914780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8534ec00 r8:849147ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914780 r8:8027f5e8 r7:eaf99e60 r6:84aec400 r5:8534ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487e900 INFO: task kworker/1:473:4659 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9236e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:4661 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:4661 tgid:4661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb0cdd84 r8:00000002 r7:60000113 r6:eb0cdd8c r5:83ad8000 r4:83ad8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8487ecc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ad8000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0961000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e6f8c r4:852e6c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e6f8c r4:84914800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad8000 r8:8491482c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914800 r8:8027f5e8 r7:eaf99e60 r6:84aec480 r5:83ad8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0cdfb0 to 0xeb0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487ea00 INFO: task kworker/1:474:4661 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 92554000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:475:4665 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:475 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf41d84 r8:00000002 r7:60000013 r6:eaf41d8c r5:852ab000 r4:852ab000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ab000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf41e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8487ef40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab33000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e778c r4:852e7400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e778c r4:84914880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ab000 r8:849148ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914880 r8:8027f5e8 r7:eaf99e60 r6:84914900 r5:852ab000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf41fb0 to 0xeaf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487ef00 INFO: task kworker/1:475:4665 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 92554000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:476:4669 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:476 state:D stack:0 pid:4669 tgid:4669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eaf91d84 r8:00000002 r7:60000113 r6:eaf91d8c r5:83ad8c00 r4:83ad8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab7240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ad8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e7f8c r4:852e7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e7f8c r4:84914980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad8c00 r8:849149ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914980 r8:8027f5e8 r7:eaf41e60 r6:84aec500 r5:83ad8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf91fb0 to 0xeaf91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8487ee00 INFO: task kworker/1:476:4669 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 92e36000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:4670 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:4670 tgid:4670 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb0e1d84 r8:00000002 r7:60000113 r6:eb0e1d8c r5:83ad9800 r4:83ad9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ad9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a91a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83ad9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531db8c r4:8531d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8531db8c r4:84aec580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ad9800 r8:84aec5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec580 r8:8027f5e8 r7:eaf0de60 r6:84aec600 r5:83ad9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e1fb0 to 0xeb0e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84359d40 INFO: task kworker/0:297:4670 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 92e36000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:477:4671 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:477 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb0e5d84 r8:00000002 r7:60000113 r6:eb0e5d8c r5:852ac800 r4:852ac800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ac800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab7040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852e7b8c r4:852e7800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852e7b8c r4:84914a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ac800 r8:84914a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914a00 r8:8027f5e8 r7:eaf91e60 r6:84914a80 r5:852ac800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e5fb0 to 0xeb0e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab7080 INFO: task kworker/1:477:4671 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9336a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:4675 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:4675 tgid:4675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb0ddd84 r8:00000002 r7:60000013 r6:eb0ddd8c r5:852abc00 r4:852abc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852abc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0dde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab7300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852abc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead03000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ec38c r4:852ec000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ec38c r4:84914b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852abc00 r8:84914b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914b00 r8:8027f5e8 r7:eaf91e60 r6:84914b80 r5:852abc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0ddfb0 to 0xeb0ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab7200 INFO: task kworker/1:478:4675 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9336a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:479:4676 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:479 state:D stack:0 pid:4676 tgid:4676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb111d84 r8:00000002 r7:60000013 r6:eb111d8c r5:852ae000 r4:852ae000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ae000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb111e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab7700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead87000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ecb8c r4:852ec800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ecb8c r4:84914c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ae000 r8:84914c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914c00 r8:8027f5e8 r7:eb0dde60 r6:84914c80 r5:852ae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb111fb0 to 0xeb111ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab7340 INFO: task kworker/1:479:4676 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 93ea1000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:4677 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:4677 tgid:4677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb109d84 r8:00000002 r7:60000113 r6:eb109d8c r5:852aec00 r4:852aec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852aec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb109e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab7500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852aec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead39000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ec78c r4:852ec400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ec78c r4:84914d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852aec00 r8:84914d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914d00 r8:8027f5e8 r7:eb111e60 r6:84914d80 r5:852aec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb109fb0 to 0xeb109ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab7340 INFO: task kworker/1:480:4677 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 93ea1000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:481:4680 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:481 state:D stack:0 pid:4680 tgid:4680 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb115d84 r8:00000002 r7:60000113 r6:eb115d8c r5:852ad400 r4:852ad400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ad400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb115e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab7800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ad400 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ecf8c r4:852ecc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ecf8c r4:84914e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ad400 r8:84914e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914e00 r8:8027f5e8 r7:eb111e60 r6:84914e80 r5:852ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb115fb0 to 0xeb115ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab76c0 INFO: task kworker/1:481:4680 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 93f27000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:482:4682 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:482 state:D stack:0 pid:4682 tgid:4682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb119d84 r8:00000002 r7:60000113 r6:eb119d8c r5:852a9800 r4:852a9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852a9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab7b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae69000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ed78c r4:852ed400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ed78c r4:84914f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852a9800 r8:84914f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84914f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84914f00 r8:8027f5e8 r7:eb115e60 r6:84914f80 r5:852a9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb119fb0 to 0xeb119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab7780 INFO: task kworker/1:482:4682 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 943e6000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:483:4683 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:483 state:D stack:0 pid:4683 tgid:4683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb131d84 r8:00000002 r7:60000013 r6:eb131d8c r5:85265400 r4:85265400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85265400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb131e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab7ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85265400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae39000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ed38c r4:852ed000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ed38c r4:84822000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85265400 r8:8482202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822000 r8:8027f5e8 r7:eb119e60 r6:84822080 r5:85265400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb131fb0 to 0xeb131ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab7780 INFO: task kworker/1:483:4683 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9470d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:484:4687 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:484 state:D stack:0 pid:4687 tgid:4687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb12dd84 r8:00000002 r7:60000113 r6:eb12dd8c r5:852b0000 r4:852b0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab7d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae79000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852edb8c r4:852ed800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852edb8c r4:84822100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b0000 r8:8482212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822100 r8:8027f5e8 r7:eb119e60 r6:84822180 r5:852b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab7bc0 INFO: task kworker/1:484:4687 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 94a99000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:485:4688 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:485 state:D stack:0 pid:4688 tgid:4688 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb135d84 r8:00000002 r7:60000013 r6:eb135d8c r5:852b0c00 r4:852b0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab7c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf01000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ee38c r4:852ee000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ee38c r4:84822200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b0c00 r8:8482222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822200 r8:8027f5e8 r7:eb12de60 r6:84822280 r5:852b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab7bc0 INFO: task kworker/1:485:4688 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 94c96000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:486:4690 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:486 state:D stack:0 pid:4690 tgid:4690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb149d84 r8:00000002 r7:60000013 r6:eb149d8c r5:852b1800 r4:852b1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84359240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b1800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852edf8c r4:852edc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852edf8c r4:84822300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b1800 r8:8482232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822300 r8:8027f5e8 r7:eb135e60 r6:84822380 r5:852b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb149fb0 to 0xeb149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ab7fc0 INFO: task kworker/1:486:4690 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 95224000 e01a1000 00000001 80239b98 7f63f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:852b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf27000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852ee78c r4:852ee400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ee78c r4:84822400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b2400 r8:8482242c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822400 r8:8027f5e8 r7:eb135e60 r6:84822480 r5:852b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb159fb0 to 0xeb159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a96000 INFO: task kworker/1:487:4692 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 95565000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a96240 r5:00001000 r4:eaf31000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84822500 r8:8027f5e8 r7:eb159e60 r6:84822580 r5:852b3000 r4:84a96180 Workqueue: events bpf_prog_free_deferred 1d20: 95565000 e01a1000 00000001 80239b98 7f63f000 00000001 r4:e0631dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaf51000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:852ef38c r4:852ef000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852ef38c r4:84822600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b3c00 r8:8482262c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822600 r8:8027f5e8 r7:eb161e60 r6:84822680 r5:852b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb165fb0 to 0xeb165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a96180 INFO: task kworker/1:489:4696 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 959e0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:490:4698 blocked for more than 466 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:490 state:D stack:0 pid:4698 tgid:4698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb14dd84 r8:00000002 r7:60000013 r6:eb14dd8c r5:852b4800 r4:852b4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb14de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a96300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b4800 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf47000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852eef8c r4:852eec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852eef8c r4:84822700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b4800 r8:8482272c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r4:00000000 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaf6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:4703 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:4703 tgid:4703 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb171d84 r8:00000002 r7:60000113 r6:eb171d8c r5:852b6000 r4:852b6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a96780 r5:00001000 r4:eaf9d000 r10:00000000 r9:84822900 r8:8027f5e8 r7:eb169e60 r6:84822980 r5:852b6000 Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eafc5000 r7:ddde2d80 r6:83018200 r5:852f838c r4:84822a00 r4:84a967c0 INFO: task kworker/1:493:4704 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 96762000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:4705 tgid:4705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb16dd84 r8:00000002 r7:60000113 r6:eb16dd8c r5:852b8000 r4:852b8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a96a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafb9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852eff8c r4:852efc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852eff8c r4:84822b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b8000 r8:84822b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb16dfb0 to 0xeb16dff8) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bea800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1b7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f8f8c r4:852f8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852f8f8c r4:84822c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b9800 r8:84822c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84822c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84822c00 r8:8027f5e8 r7:eb175e60 r6:84822c80 r5:852b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb17dfb0 to 0xeb17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a96b00 INFO: task kworker/1:495:4707 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 96e77000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:4709 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:4709 tgid:4709 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:852ba400 r4:852ba400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ba400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eafd7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:852f878c r4:84822d00 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 970ad000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:298:4711 blocked for more than 467 seconds. [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eafdf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8531d78c r4:8531d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fa0: 00000000 00000000 00000000 00000000 [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9742c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:4712 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:eb0f7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xeb18dfb0 to 0xeb18dff8) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:00001000 r4:eb219000 Exception stack(0xeb195fb0 to 0xeb195ff8) [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r5:00001000 r4:e01cf000 Exception stack(0xe0631fb0 to 0xe0631ff8) Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb199d84 r8:00000002 r7:60000113 r6:eb199d8c r5:852b8c00 r4:852b8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852b8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a91b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:852b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8531df8c r4:8531dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8531df8c r4:84aec780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852b8c00 r8:84aec7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec780 r8:8027f5e8 r7:eb195e60 r6:84a88000 r5:852b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a91c40 r7:ddde2d80 r6:83018200 r5:8531e38c r4:84a88080 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 98106000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a91ac0 1d20: 98106000 e01a1000 00000001 80239b98 7f63f000 00000001 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1d20: 983f5000 e01a1000 00000001 80239b98 7f63f000 00000001 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:499:4725 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:499 state:D stack:0 pid:4725 tgid:4725 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb1c1d84 r8:00000002 r7:60000013 r6:eb1c1d8c r5:852c3000 r4:852c3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852c3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beab40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f978c r4:852f9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852f978c r4:84a88280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c3000 r8:84a882ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a88280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a88280 r8:8027f5e8 r7:eb17de60 r6:84a88300 r5:852c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c1fb0 to 0xeb1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bea7c0 INFO: task kworker/1:499:4725 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 985d9000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:4726 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:4726 tgid:4726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb179d84 r8:00000002 r7:60000013 r6:eb179d8c r5:83ada400 r4:83ada400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ada400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb179e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bea640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ada400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f938c r4:852f9000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852f938c r4:84a88380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83ada400 r8:84a883ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a88380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a88380 r8:8027f5e8 r7:eb1c1e60 r6:84aec900 r5:83ada400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb179fb0 to 0xeb179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bea640 INFO: task kworker/1:500:4726 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 98ba7000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:501:4729 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:501 state:D stack:0 pid:4729 tgid:4729 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb189d84 r8:00000002 r7:60000013 r6:eb189d8c r5:83adb000 r4:83adb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83adb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beadc0 r5:00001000 r4:eb1d7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852f9f8c r4:852f9c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852f9f8c r4:84a88400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adb000 r8:84a8842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a88400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a88400 r8:8027f5e8 r7:eb1c1e60 r6:84aec980 r5:83adb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb189fb0 to 0xeb189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84beaac0 INFO: task kworker/1:501:4729 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r5:8436478c r4:84364400 r4:8494cf80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:502 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1cd000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a96cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83add400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852fa78c r4:852fa400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fa78c r4:84a88500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83add400 r8:84a8852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a88500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a88500 r8:8027f5e8 r7:eb189e60 r6:84aeca80 r5:83add400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84beae00 INFO: task kworker/1:503:4733 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 98e4e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:504:4735 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:504 state:D stack:0 pid:4735 tgid:4735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb1e9d84 r8:00000002 r7:60000013 r6:eb1e9d8c r5:83ade000 r4:83ade000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83ade000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb1dd000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a88580 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d20: 99594000 e01a1000 00000001 80239b98 7f63f000 00000001 r4:e0631dc0 r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:505:4737 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:505 state:D stack:0 pid:4737 tgid:4737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb1f5d84 r8:00000002 r7:60000113 r6:eb1f5d8c r5:83adec00 r4:83adec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83adec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8494a1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83adec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852faf8c r4:852fac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852faf8c r4:84a88600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adec00 r8:84a8862c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a88600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a88600 r8:8027f5e8 r7:eb1e1e60 r6:84aecb80 r5:83adec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f5fb0 to 0xeb1f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bea5c0 INFO: task kworker/1:505:4737 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 99594000 e01a1000 00000001 80239b98 7f63f000 00000001 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:506 state:D stack:0 pid:4739 tgid:4739 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb1f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb1b1fb0 to 0xeb1b1ff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 99926000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:507:4740 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:507 state:D stack:0 pid:4740 tgid:4740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb20dd84 r8:00000002 r7:60000113 r6:eb20dd8c r5:852c4800 r4:852c4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852c4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8494a500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb205000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852fb38c r4:852fb000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fb38c r4:84a88780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c4800 r8:84a887ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a88780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a88780 r8:8027f5e8 r7:eb1f5e60 r6:84a88800 r5:852c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb20dfb0 to 0xeb20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8494a180 INFO: task kworker/1:507:4740 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:e0631dc0 r5:00001000 r4:e01cf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:508:4743 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:508 state:D stack:0 pid:4743 tgid:4743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb21dd84 r8:00000002 r7:60000113 r6:eb21dd8c r5:852c3c00 r4:852c3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852c3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb235000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84a88880 Exception stack(0xeb21dfb0 to 0xeb21dff8) r4:8494a4c0 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:303 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb22de08 r5:00001000 r4:dfa53000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8531fb8c r4:8531f800 r10:61c88647 r9:852c5400 r8:84aecc2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 99e98000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:509:4748 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:509 state:D stack:0 pid:4748 tgid:4748 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb239d84 r8:00000002 r7:60000113 r6:eb239d8c r5:852c6c00 r4:852c6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852c6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb239e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8494a940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb22f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r4:e0631dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:852fbf8c r4:852fbc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:852fbf8c r4:84a88b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c1800 r8:84a88b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a88b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a88b00 r8:8027f5e8 r7:eb21de60 r6:84a88b80 r5:852c1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb229fb0 to 0xeb229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8494ac80 INFO: task kworker/1:510:4750 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9a234000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:304:4751 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb267000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:852c6000 r8:84aeccac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bdc140 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:511:4753 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:511 state:D stack:0 pid:4753 tgid:4753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb209d84 r8:00000002 r7:60000013 r6:eb209d8c r5:852bec00 r4:852bec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852bec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb209e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8494ae40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb245000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530438c r4:85304000 r7:ddde2d80 r6:83018200 r5:8530438c r4:84a88c80 Exception stack(0xeb209fb0 to 0xeb209ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:852be000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 r5:00001000 r4:eb253000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:513:4757 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:513 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb251d84 r8:00000002 r7:60000013 r6:eb251d8c r5:852c8000 r4:852c8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852c8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb259000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85304b8c r4:84a88e80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:852c9800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08 r5:00001000 r4:e01bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb265fb0 to 0xeb265ff8) INFO: task kworker/1:514:4759 is blocked on a mutex likely owned by task kworker/1:288:3824. Exception stack(0xe0631d28 to 0xe0631d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 Workqueue: events bpf_prog_free_deferred r10:829188dc r9:eb039d84 r8:00000002 r7:60000013 r6:eb039d8c r5:852ca400 r4:852ca400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852ca400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb039e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c7640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffc9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85304f8c r4:85304c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85304f8c r4:84a8d080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852ca400 r8:84a8d0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8d080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8d080 r8:8027f5e8 r7:eb265e60 r6:84a8d100 r5:852ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb039fb0 to 0xeb039ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c7280 INFO: task kworker/1:515:4762 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9b372000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:516:4766 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:516 state:D stack:0 pid:4766 tgid:4766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb279d84 r8:00000002 r7:60000113 r6:eb279d8c r5:852cbc00 r4:852cbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852cbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb279e08 r4:00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e0665000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8530578c r4:84a8d180 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:517:4769 blocked for more than 467 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:517 state:D stack:0 pid:4769 tgid:4769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb049d84 r8:00000002 r7:60000113 r6:eb049d8c r5:852c8c00 r4:852c8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852c8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb049e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c7b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0801000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85305f8c r4:85305c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85305f8c r4:84a8d280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852c8c00 r8:84a8d2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8d280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8d280 r8:8027f5e8 r7:eb279e60 r6:84a8d300 r5:852c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb049fb0 to 0xeb049ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c78c0 INFO: task kworker/1:517:4769 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9b9f6000 e01a1000 00000001 80239b98 7f63f000 00000001 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:518 state:D stack:0 pid:4771 tgid:4771 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:e0771000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85305b8c r4:85305800 r4:84a8d380 Exception stack(0xeb271fb0 to 0xeb271ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r4:e0631dc0 r5:00001000 r4:e01cf000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:519:4773 blocked for more than 468 seconds. r4:852cd400 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e8a2b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530638c r4:84a8d480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cd400 r8:84a8d4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8d480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8d480 r8:8027f5e8 r7:eb049e60 r6:84a8d500 r5:852cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb27dfb0 to 0xeb27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c7ac0 INFO: task kworker/1:519:4773 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9c063000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:520:4775 blocked for more than 468 seconds. r4:852ce000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb281e08 r5:00001000 r4:eabab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 INFO: task kworker/1:521:4777 blocked for more than 468 seconds. r4:852cec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac05000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:522:4778 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:522 state:D stack:0 pid:4778 tgid:4778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb25dd84 r8:00000002 r7:60000013 r6:eb25dd8c r5:852cb000 r4:852cb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:852cb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848c7340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:852cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabdd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85306b8c r4:85306800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85306b8c r4:84a8d780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:852cb000 r8:84a8d7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8d780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8d780 r8:8027f5e8 r7:eb285e60 r6:84a8d800 r5:852cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb25dfb0 to 0xeb25dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848c7f40 INFO: task kworker/1:522:4778 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9c6cb000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:e01cf000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:853b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 r5:00001000 r4:ead4d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb289fb0 to 0xeb289ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bdc940 INFO: task kworker/0:305:4780 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9ca20000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:306:4781 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:306 state:D stack:0 pid:4781 tgid:4781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb291d84 r8:00000002 r7:60000113 r6:eb291d8c r5:853b8c00 r4:853b8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853b8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb291e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb0b3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:8531ff8c r4:84aecd80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80070013 r4:80239bb0 r4:e0631dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:523:4783 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:523 state:D stack:0 pid:4783 tgid:4783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb28dd84 r8:00000002 r7:60000013 r6:eb28dd8c r5:853b9800 r4:853b9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853b9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb28de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bec300 r5:00001000 r4:eafe1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8530778c r4:85307400 r10:61c88647 r9:853b9800 r8:84a8d9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:524 state:D stack:0 pid:4785 tgid:4785 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb295d84 r8:00000002 r7:60000113 r6:eb295d8c r5:853ba400 r4:853ba400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853ba400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bec240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac33000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8530738c r4:85307000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8530738c r4:84a8da80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ba400 r8:84a8daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8da80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8da80 r8:8027f5e8 r7:eb28de60 r6:84a8db00 r5:853ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb295fb0 to 0xeb295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bec140 INFO: task kworker/1:524:4785 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9ce1e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:525:4786 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:525 state:D stack:0 pid:4786 tgid:4786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:853bb000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb027000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85307b8c r4:85307800 r10:61c88647 r9:853bb000 r8:84a8dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: r5:853bbc00 r4:829188d8 r4:00000000 r9:83018205 r8:853bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:00001000 r4:eb03b000 r7:ddde2d80 r6:83018200 r5:85307f8c r4:84a8dc80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:527:4791 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:527 state:D stack:0 pid:4791 tgid:4791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb2a1d84 r8:00000002 r7:60000113 r6:eb2a1d8c r5:853bc800 r4:853bc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853bc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bec8c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb04d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538838c r4:85388000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8538838c r4:84a8dd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853bc800 r8:84a8ddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84a8dd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84a8dd80 r8:8027f5e8 r7:eb29de60 r6:84a8de00 r5:853bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a1fb0 to 0xeb2a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bec640 INFO: task kworker/1:527:4791 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe0631d28 to 0xe0631d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r5:8436478c r4:84364400 r4:8494cf80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:528 state:D stack:0 pid:4792 tgid:4792 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08 r5:00001000 r4:eb059000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8538878c r4:84a8de80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bec640 INFO: task kworker/1:528:4792 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9d951000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:529:4794 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb07b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:530:4796 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:530 state:D stack:0 pid:4796 tgid:4796 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb2b1d84 r8:00000002 r7:60000013 r6:eb2b1d8c r5:853c0000 r4:853c0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84becb80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb069000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85388b8c r4:85388800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85388b8c r4:85001080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c0000 r8:850010ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85001080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85001080 r8:8027f5e8 r7:eb2ade60 r6:85001100 r5:853c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84becbc0 INFO: task kworker/1:530:4796 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9e1b2000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:531:4798 blocked for more than 468 seconds. r4:853c1800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r5:00001000 r4:eb099000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8538978c r4:85001180 Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) INFO: task kworker/1:531:4798 is blocked on a mutex likely owned by task kworker/1:288:3824. Exception stack(0xe0631d28 to 0xe0631d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:853c3000 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb087000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b9fb0 to 0xeb2b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf7100 INFO: task kworker/1:532:4800 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9e753000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:533:4802 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:533 state:D stack:0 pid:4802 tgid:4802 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb2bdd84 r8:00000002 r7:60000013 r6:eb2bdd8c r5:853c3c00 r4:853c3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb2bdfb0 to 0xeb2bdff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:e0631dc0 r5:00001000 r4:e01cf000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:534 state:D stack:0 pid:4804 tgid:4804 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85389f8c r4:85001480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c4800 r8:850014ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85001480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85001480 r8:8027f5e8 r7:eb2bde60 r6:85001500 r5:853c4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c1fb0 to 0xeb2c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf74c0 INFO: task kworker/1:534:4804 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9f5d1000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:535:4806 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:535 state:D stack:0 pid:4806 tgid:4806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb2cdd84 r8:00000002 r7:60000113 r6:eb2cdd8c r5:853c2400 r4:853c2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf79c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c2400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538a38c r4:8538a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8538a38c r4:85001580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c2400 r8:850015ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85001580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85001580 r8:8027f5e8 r7:eb2c1e60 r6:85001600 r5:853c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2cdfb0 to 0xeb2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf78c0 INFO: task kworker/1:535:4806 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9f5d1000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:536:4809 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:536 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:853c5400 r4:853c5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf7ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538a78c r4:8538a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8538a78c r4:85001680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c5400 r8:850016ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85001680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85001680 r8:8027f5e8 r7:eb2cde60 r6:85001700 r5:853c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf7980 INFO: task kworker/1:536:4809 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9fa4c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:537:4812 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:537 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb2a5d84 r8:00000002 r7:60000113 r6:eb2a5d8c r5:853c6000 r4:853c6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf7c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2df000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538ab8c r4:8538a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8538ab8c r4:85001780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c6000 r8:850017ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85001780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85001780 r8:8027f5e8 r7:eb2c5e60 r6:85001800 r5:853c6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a5fb0 to 0xeb2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf7a40 INFO: task kworker/1:537:4812 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: 9fa4c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:538:4813 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:538 state:D stack:0 pid:4813 tgid:4813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb2ddd84 r8:00000002 r7:60000013 r6:eb2ddd8c r5:853c6c00 r4:853c6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84becc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538b38c r4:8538b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8538b38c r4:85001880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c6c00 r8:850018ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85001880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85001880 r8:8027f5e8 r7:eb2a5e60 r6:85001900 r5:853c6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf7dc0 INFO: task kworker/1:538:4813 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 Exception stack(0xe0631d28 to 0xe0631d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:e01cf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2f1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf7d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538af8c r4:8538ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8538af8c r4:85001980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c0c00 r8:850019ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85001980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85001980 r8:8027f5e8 r7:eb2dde60 r6:85001a00 r5:853c0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f1fb0 to 0xeb2f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf7ec0 INFO: task kworker/1:539:4814 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a006a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 INFO: task kworker/1:540:4817 blocked for more than 468 seconds. r10:829188dc r9:eb2e9d84 r8:00000002 r7:60000013 r6:eb2e9d8c r5:853be000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb2fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8538b78c r4:85001a80 Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85009000 INFO: task kworker/1:540:4817 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a056f000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 task:kworker/1:541 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb301e08 r5:00001000 r4:eb30b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8538bb8c r4:8538b800 r4:85001c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 Workqueue: events bpf_prog_free_deferred r5:853c9800 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb311000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8538bf8c r4:8538bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8538bf8c r4:85001c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c9800 r8:85001cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85001c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85001c80 r8:8027f5e8 r7:eb301e60 r6:85001d00 r5:853c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2f5fb0 to 0xeb2f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85009180 INFO: task kworker/1:542:4821 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a0f01000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:307:4822 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r5:853ca400 r4:829188d8 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850eb5c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8439f38c r4:8439f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439f38c r4:84aece00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ca400 r8:84aece2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aece00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aece00 r8:8027f5e8 r7:eb289e60 r6:85001d80 r5:853ca400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000001 INFO: task kworker/1:543:4823 blocked for more than 468 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb31de08 r5:00001000 r4:eb323000 r5:8539438c r4:85394000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8539438c r4:85001e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cb000 r8:85001e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85001e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85001e00 r8:8027f5e8 r7:eb2f5e60 r6:85001e80 r5:853cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb31dfb0 to 0xeb31dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85009640 INFO: task kworker/1:543:4823 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a1210000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:544:4826 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:544 state:D stack:0 pid:4826 tgid:4826 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb309d84 r8:00000002 r7:60000013 r6:eb309d8c r5:853cbc00 r4:853cbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853cbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb309e08 r4:00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb329000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539478c r4:85394400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8539478c r4:85001f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cbc00 r8:85001f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85001f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85001f00 r8:8027f5e8 r7:eb31de60 r6:85001f80 r5:853cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb309fb0 to 0xeb309ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850096c0 INFO: task kworker/1:544:4826 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a1210000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:853cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 r5:00001000 r4:eb337000 r5:85394b8c r4:85394800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:546 state:D stack:0 pid:4830 tgid:4830 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829188dc r9:eb335d84 r8:00000002 r7:60000113 r6:eb335d8c r5:853cd400 r4:853cd400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853cd400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489c6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0dd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb365000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85395b8c r4:85395800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85395b8c r4:8490e180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853cd400 r8:8490e1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490e180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e180 r8:8027f5e8 r7:eb32de60 r6:8490e200 r5:853cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb335fb0 to 0xeb335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85009c00 INFO: task kworker/1:546:4830 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a15b6000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:547:4832 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:547 state:D stack:0 pid:4832 tgid:4832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb341d84 r8:00000002 r7:60000013 r6:eb341d8c r5:853ce000 r4:853ce000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb33d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85394f8c r4:85394c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85394f8c r4:8490e280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ce000 r8:8490e2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490e280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e280 r8:8027f5e8 r7:eb335e60 r6:8490e300 r5:853ce000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb341fb0 to 0xeb341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85009e40 INFO: task kworker/1:547:4832 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a18da000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 task:kworker/1:548 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb35de08 r5:00001000 r4:eb35f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8539578c r4:85395400 r10:61c88647 r9:853cec00 r8:8490e3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:853c8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853c8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb369e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85149040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853c8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb379000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539638c r4:85396000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8539638c r4:8490e480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853c8c00 r8:8490e4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490e480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e480 r8:8027f5e8 r7:eb335e60 r6:8490e500 r5:853c8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf7100 INFO: task kworker/1:549:4837 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a1c0d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:550:4838 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:550 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb371d84 r8:00000002 r7:60000013 r6:eb371d8c r5:853d0000 r4:853d0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb371e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf7d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0df000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb373000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85395f8c r4:85395c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85395f8c r4:8490e580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d0000 r8:8490e5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490e580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e580 r8:8027f5e8 r7:eb369e60 r6:8490e600 r5:853d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb371fb0 to 0xeb371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85149080 INFO: task kworker/1:550:4838 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a222d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:551:4840 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:551 state:D stack:0 pid:4840 tgid:4840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb37dd84 r8:00000002 r7:60000013 r6:eb37dd8c r5:853d0c00 r4:853d0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb37de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851491c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb387000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539678c r4:85396400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8539678c r4:8490e680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d0c00 r8:8490e6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490e680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e680 r8:8027f5e8 r7:eb369e60 r6:8490e700 r5:853d0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb37dfb0 to 0xeb37dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85149300 INFO: task kworker/1:551:4840 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a2715000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:00000000 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:552:4842 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:552 state:D stack:0 pid:4842 tgid:4842 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb321d84 r8:00000002 r7:60000113 r6:eb321d8c r5:853d2400 r4:853d2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851495c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0e7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85396b8c r4:85396800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85396b8c r4:8490e780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d2400 r8:8490e7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490e780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e780 r8:8027f5e8 r7:eb37de60 r6:8490e800 r5:853d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb321fb0 to 0xeb321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85149180 INFO: task kworker/1:552:4842 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:308 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:853d1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 r5:00001000 r4:eb215000 r5:8439ef8c r4:8439ec00 r10:61c88647 r9:853d1800 r8:84aeceac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8494cf80 Exception stack(0xe0631fb0 to 0xe0631ff8) r4:84be4100 task:kworker/1:553 state:D stack:0 pid:4846 tgid:4846 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85149800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0e9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3a1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85396f8c r4:85396c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85396f8c r4:8490e900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d3c00 r8:8490e92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490e900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490e900 r8:8027f5e8 r7:eb321e60 r6:8490e980 r5:853d3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb395fb0 to 0xeb395ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85149580 INFO: task kworker/1:553:4846 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a2715000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:554:4847 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:554 state:D stack:0 pid:4847 tgid:4847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3a5d84 r8:00000002 r7:60000113 r6:eb3a5d8c r5:853d4800 r4:853d4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851498c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f0eb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3af000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8539738c r4:85397000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8539738c r4:8490ea00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d4800 r8:8490ea2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490ea00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490ea00 r8:8027f5e8 r7:eb395e60 r6:8490ea80 r5:853d4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a5fb0 to 0xeb3a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85149580 INFO: task kworker/1:554:4847 is blocked on a mutex likely owned by task kworker/1:288:3824. r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r4:00000000 r5:00001000 r4:e01cf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:555:4850 blocked for more than 468 seconds. r4:853d5400 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb3b5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:8490eb00 r8:8027f5e8 r7:eb3a5e60 r6:8490eb80 r5:853d5400 Exception stack(0xeb385fb0 to 0xeb385ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85149a80 INFO: task kworker/1:555:4850 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a2ccd000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:556:4853 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:556 state:D stack:0 pid:4853 tgid:4853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3b9d84 r8:00000002 r7:60000113 r6:eb3b9d8c r5:853d6000 r4:853d6000 r5:853d6000 r4:829188d8 r4:00000000 r4:00000000 r5:00001000 r4:eb3c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:853d6000 r8:8490ec2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb3b9fb0 to 0xeb3b9ff8) INFO: task kworker/1:556:4853 is blocked on a mutex likely owned by task kworker/1:288:3824. Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r4:e0631dc0 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:557:4854 blocked for more than 468 seconds. r10:829188dc r9:eb3c1d84 r8:00000002 r7:60000113 r6:eb3c1d8c r5:853d6c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:dfa31000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853d6c00 r8:8490ed2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:558:4857 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:558 state:D stack:0 pid:4857 tgid:4857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3d1d84 r8:00000002 r7:60000113 r6:eb3d1d8c r5:853d3000 r4:853d3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853d3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85149e40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853d3000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe97000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a438c r4:853a4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a438c r4:8490ee00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853d3000 r8:8490ee2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8490ee00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8490ee00 r8:8027f5e8 r7:eb3c1e60 r6:8490ee80 r5:853d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85149d40 INFO: task kworker/1:558:4857 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a3bda000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 task:kworker/1:559 state:D stack:0 pid:4858 tgid:4858 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:e0815000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:560:4861 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:560 state:D stack:0 pid:4861 tgid:4861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3e1d84 r8:00000002 r7:60000013 r6:eb3e1d8c r5:8436b000 r4:8436b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8436b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bd040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8436b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a4b8c r4:853a4800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a4b8c r4:851be000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8436b000 r8:851be02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851be000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be000 r8:8027f5e8 r7:eb1a9e60 r6:84aecf00 r5:8436b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bd080 INFO: task kworker/1:560:4861 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a3bda000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:561:4862 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:561 state:D stack:0 pid:4862 tgid:4862 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:8436d400 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bd1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8436d400 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e095b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a4f8c r4:853a4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a4f8c r4:851be080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8436d400 r8:851be0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 INFO: task kworker/1:562:4864 blocked for more than 468 seconds. r10:829188dc r9:eb3e9d84 r8:00000002 r7:60000013 r6:eb3e9d8c r5:8436bc00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e8a65000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:853a538c r4:851be100 Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0631fb0 to 0xe0631ff8) r4:84be4100 INFO: task kworker/1:563:4867 blocked for more than 468 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:563 state:D stack:0 pid:4867 tgid:4867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3edd84 r8:00000002 r7:60000113 r6:eb3edd8c r5:8436e000 r4:8436e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8436e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bd480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8436e000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab67000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a578c r4:853a5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a578c r4:851be180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8436e000 r8:851be1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851be180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be180 r8:8027f5e8 r7:eb3e9e60 r6:851c6080 r5:8436e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bd300 INFO: task kworker/1:563:4867 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a44a8000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:564 state:D stack:0 pid:4869 tgid:4869 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac63000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a5b8c r4:853a5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a5b8c r4:851be200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8436ec00 r8:851be22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851be200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be200 r8:8027f5e8 r7:eb3ede60 r6:851c6100 r5:8436ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f1fb0 to 0xeb3f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bd300 INFO: task kworker/1:564:4869 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a44a8000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:565 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eacef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:8436c800 r8:851be2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eae5b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a6b8c r4:853a6800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a6b8c r4:851be300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8436a400 r8:851be32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851be300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be300 r8:8027f5e8 r7:eb3f5e60 r6:851c6200 r5:8436a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bd780 INFO: task kworker/1:566:4872 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a47b6000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:567:4873 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:567 state:D stack:0 pid:4873 tgid:4873 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ead3f000 r5:853a638c r4:853a6000 r4:851be380 Exception stack(0xeb3fdfb0 to 0xeb3fdff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:568 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb405e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:851be400 Exception stack(0xeb405fb0 to 0xeb405ff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:569:4879 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:569 state:D stack:0 pid:4879 tgid:4879 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb40dd84 r8:00000002 r7:60000113 r6:eb40dd8c r5:83adbc00 r4:83adbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83adbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb40de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851bdc80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83adbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae75000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a6f8c r4:853a6c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a6f8c r4:851be480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83adbc00 r8:851be4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851be480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be480 r8:8027f5e8 r7:eb3f9e60 r6:851c6380 r5:83adbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb40dfb0 to 0xeb40dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851bdac0 INFO: task kworker/1:569:4879 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a5179000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:570:4880 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:570 state:D stack:0 pid:4880 tgid:4880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb411d84 r8:00000002 r7:60000013 r6:eb411d8c r5:84970000 r4:84970000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84970000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb411e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f21c0 r5:00001000 r4:eaf37000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84970000 r8:851be52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb411fb0 to 0xeb411ff8) INFO: task kworker/1:570:4880 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a54ab000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eb415d84 r8:00000002 r7:60000013 r6:eb415d8c r5:84970c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 r9:83018205 r8:84970c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 r5:00001000 r4:eaea5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853a738c r4:853a7000 r10:61c88647 r9:84970c00 r8:851be5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb415fb0 to 0xeb415ff8) INFO: task kworker/1:571:4882 is blocked on a mutex likely owned by task kworker/1:288:3824. Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:572 state:D stack:0 pid:4885 tgid:4885 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eaf1d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84971800 r8:851be62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851be600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be600 r8:8027f5e8 r7:eb411e60 r6:851c6500 r5:84971800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb419fb0 to 0xeb419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f20c0 INFO: task kworker/1:572:4885 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a56e9000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:573:4887 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:573 state:D stack:0 pid:4887 tgid:4887 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb41dd84 r8:00000002 r7:60000113 r6:eb41dd8c r5:84972400 r4:84972400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84972400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f23c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84972400 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf4f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a7f8c r4:853a7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a7f8c r4:851be680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84972400 r8:851be6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851be680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be680 r8:8027f5e8 r7:eb411e60 r6:851c6580 r5:84972400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb41dfb0 to 0xeb41dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f2180 INFO: task kworker/1:573:4887 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a5f3c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:574:4889 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:574 state:D stack:0 pid:4889 tgid:4889 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb421d84 r8:00000002 r7:60000013 r6:eb421d8c r5:84973000 r4:84973000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84973000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f2480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84973000 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf5f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a838c r4:853a8000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a838c r4:851be700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84973000 r8:851be72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851be700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be700 r8:8027f5e8 r7:eb41de60 r6:851c6600 r5:84973000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb421fb0 to 0xeb421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f2240 INFO: task kworker/1:574:4889 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a5f3c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r4:853db000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f25c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853db000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf9b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a878c r4:853a8400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a878c r4:851be780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853db000 r8:851be7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851be780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851be780 r8:8027f5e8 r7:eb421e60 r6:851be800 r5:853db000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb409fb0 to 0xeb409ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f22c0 INFO: task kworker/1:575:4890 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a5f3c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:576:4892 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:576 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3add84 r8:00000002 r7:60000013 r6:eb3add8c r5:853da400 r4:853da400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853da400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafbb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853a8b8c r4:853a8800 r10:61c88647 r9:853da400 r8:851be8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f2600 INFO: task kworker/1:576:4892 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a6531000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e0631dc0 r5:00001000 r4:e01cf000 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:577 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 r5:00001000 r4:eb0e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:853dc800 r8:851be9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:578:4896 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:578 state:D stack:0 pid:4896 tgid:4896 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb42dd84 r8:00000002 r7:60000013 r6:eb42dd8c r5:853dbc00 r4:853dbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853dbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb42de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850f29c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a8f8c r4:853a8c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a8f8c r4:851bea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853dbc00 r8:851beaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851bea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bea80 r8:8027f5e8 r7:eb429e60 r6:851beb00 r5:853dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb42dfb0 to 0xeb42dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f2600 INFO: task kworker/1:578:4896 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a6900000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:579:4898 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:579 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb435d84 r8:00000002 r7:60000113 r6:eb435d8c r5:853dd400 r4:853dd400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853dd400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb139000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853a9b8c r4:853a9800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8494cf80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:580 state:D stack:0 pid:4900 tgid:4900 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r5:00001000 r4:eb10d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853a978c r4:853a9400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853a978c r4:851bec80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853dec00 r8:851becac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851bec80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851bec80 r8:8027f5e8 r7:eb435e60 r6:851bed00 r5:853dec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb431fb0 to 0xeb431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f2d40 INFO: task kworker/1:580:4900 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a6c08000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:581:4903 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:581 state:D stack:0 pid:4903 tgid:4903 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb425d84 r8:00000002 r7:60000013 r6:eb425d8c r5:853de000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb191000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853a9f8c r4:853a9c00 r4:851bed80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:582:4905 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:582 state:D stack:0 pid:4905 tgid:4905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:853d8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r4:00000000 r5:00001000 r4:eb1ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:853d8c00 r8:851beeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a707e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:583:4907 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:583 state:D stack:0 pid:4907 tgid:4907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:853d9800 r4:829188d8 r4:00000000 r4:00000000 r5:00001000 r4:eb1c3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:853aa78c r4:851bef80 Exception stack(0xeb441fb0 to 0xeb441ff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:584:4910 blocked for more than 469 seconds. r4:84368c00 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84368c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 r5:00001000 r4:eb1cb000 r5:853aab8c r4:853aa800 r10:61c88647 r9:84368c00 r8:851cc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e01cf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:585:4911 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:585 state:D stack:0 pid:4911 tgid:4911 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb451d84 r8:00000002 r7:60000013 r6:eb451d8c r5:84975400 r4:84975400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84975400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb451e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cd480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84975400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ab38c r4:853ab000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853ab38c r4:851cc180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84975400 r8:851cc1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cc180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cc180 r8:8027f5e8 r7:eb445e60 r6:851c6680 r5:84975400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb451fb0 to 0xeb451ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cd180 INFO: task kworker/1:585:4911 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a78e0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:586:4913 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:586 state:D stack:0 pid:4913 tgid:4913 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84976c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84976c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cd3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84976c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853aaf8c r4:853aac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853aaf8c r4:851cc200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84976c00 r8:851cc22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cc200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cc200 r8:8027f5e8 r7:eb451e60 r6:851c6700 r5:84976c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cd380 INFO: task kworker/1:586:4913 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a7d95000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:587:4914 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:587 state:D stack:0 pid:4914 tgid:4914 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb461d84 r8:00000002 r7:60000013 r6:eb461d8c r5:84973c00 r4:84973c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84973c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb461e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cd700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84973c00 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb203000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853abb8c r4:853ab800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853abb8c r4:851cc280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84973c00 r8:851cc2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cc280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cc280 r8:8027f5e8 r7:eb451e60 r6:851c6780 r5:84973c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb461fb0 to 0xeb461ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cd380 INFO: task kworker/1:587:4914 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a7f32000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:588:4916 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:588 state:D stack:0 pid:4916 tgid:4916 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb469d84 r8:00000002 r7:60000113 r6:eb469d8c r5:84974800 r4:84974800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84974800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb469e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cd5c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84974800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1fb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853ab78c r4:853ab400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853ab78c r4:851cc300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84974800 r8:851cc32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cc300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cc300 r8:8027f5e8 r7:eb461e60 r6:851c6800 r5:84974800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cd4c0 INFO: task kworker/1:588:4916 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a80a8000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:589:4919 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:589 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb471d84 r8:00000002 r7:60000113 r6:eb471d8c r5:843a0c00 r4:843a0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843a0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cd980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb225000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853abf8c r4:853abc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853abf8c r4:851cc380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a0c00 r8:851cc3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cc380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cc380 r8:8027f5e8 r7:eb461e60 r6:851c6880 r5:843a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb471fb0 to 0xeb471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cd740 INFO: task kworker/1:589:4919 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a80a8000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r5:8436478c r4:84364400 r4:8494cf80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:309 state:D stack:0 pid:4921 tgid:4921 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb449e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d5080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb273000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533438c r4:85334000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533438c r4:851c6900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a1800 r8:851c692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851c6900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6900 r8:8027f5e8 r7:eb289e60 r6:851c6980 r5:843a1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb449fb0 to 0xeb449ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850f5fc0 INFO: task kworker/0:309:4921 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a8394000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:590:4924 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:590 state:D stack:0 pid:4924 tgid:4924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb475d84 r8:00000002 r7:60000013 r6:eb475d8c r5:843a2400 r4:843a2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843a2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cda40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b038c r4:853b0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b038c r4:851cc400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:851cc400 r8:8027f5e8 r7:eb471e60 r6:851c6a00 r5:843a2400 r4:851cd740 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:591:4925 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:591 state:D stack:0 pid:4925 tgid:4925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb479d84 r8:00000002 r7:60000013 r6:eb479d8c r5:843a3000 r4:843a3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843a3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb479e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cdb80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb243000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b078c r4:853b0400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b078c r4:851cc480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a3000 r8:851cc4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cc480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cc480 r8:8027f5e8 r7:eb475e60 r6:851c6a80 r5:843a3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb479fb0 to 0xeb479ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cd880 INFO: task kworker/1:591:4925 is blocked on a mutex likely owned by task kworker/1:288:3824. r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:592:4927 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:592 state:D stack:0 pid:4927 tgid:4927 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:843a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 r5:00001000 r4:eb255000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:853b0b8c r4:851cc500 r10:00000000 r9:851cc500 r8:8027f5e8 r7:eb479e60 r6:851c6b00 r5:843a3c00 r4:851cdbc0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r4:e0631dc0 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 Workqueue: events bpf_prog_free_deferred r5:843a4800 r4:829188d8 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e41c0 r5:00001000 r4:eb49b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:853b178c r4:851cc580 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cdc80 INFO: task kworker/1:593:4929 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a8cb4000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:594:4930 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:594 state:D stack:0 pid:4930 tgid:4930 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb485d84 r8:00000002 r7:60000013 r6:eb485d8c r5:843a5400 r4:843a5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843a5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cdec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb261000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b0f8c r4:853b0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b0f8c r4:851cc600 r10:00000000 r9:851cc600 r8:8027f5e8 r7:eb481e60 r6:851c6c00 r5:843a5400 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8494cf80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:595:4933 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:595 state:D stack:0 pid:4933 tgid:4933 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb46dd84 r8:00000002 r7:60000013 r6:eb46dd8c r5:843a6000 r4:843a6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843a6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:843a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb491000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b138c r4:853b1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b138c r4:851cc680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a6000 r8:851cc6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cc680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cc680 r8:8027f5e8 r7:eb481e60 r6:851c6d00 r5:843a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cde40 INFO: task kworker/1:595:4933 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a945a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb48b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851c6c80 r8:8027f5e8 r7:eb289e60 r6:851c6d80 r5:843a6c00 r4:851d5040 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:311:4936 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:311 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb439d84 r8:00000002 r7:60000113 r6:eb439d8c r5:843a0000 r4:843a0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:843a0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489cec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:843a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85335b8c r4:85335800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85335b8c r4:851c6e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:843a0000 r8:851c6e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851c6e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c6e00 r8:8027f5e8 r7:eb289e60 r6:851c6e80 r5:843a0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d5280 INFO: task kworker/0:311:4936 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a9657000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85368000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 r5:00001000 r4:eb4a1000 r7:ddde2d80 r6:83018200 r5:853b1b8c r4:851cc700 r10:00000000 r9:851cc700 r8:8027f5e8 r7:eb481e60 r6:851c6f00 r5:85368000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) r4:84be4100 Workqueue: events bpf_prog_free_deferred r5:8536a400 r4:829188d8 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8536a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b1f8c r4:853b1c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b1f8c r4:851cc780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536a400 r8:851cc7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cc780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cc780 r8:8027f5e8 r7:eb4a9e60 r6:851c6f80 r5:8536a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e42c0 INFO: task kworker/1:597:4942 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a9a84000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:598:4943 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:eb4b9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:853b238c r4:851cc880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8536b000 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:e05ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b338c r4:853b3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b338c r4:851cc900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536b000 r8:851cc92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cc900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cc900 r8:8027f5e8 r7:eb4d5e60 r6:851d6080 r5:8536b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d9fb0 to 0xeb4d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e43c0 INFO: task kworker/1:599:4944 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a9f9b000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) r4:84be4100 Workqueue: events bpf_prog_free_deferred r5:85369800 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb4cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85369800 r8:851cc82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) Not tainted 6.15.0-syzkaller #0 r4:8536bc00 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8536bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b2b8c r4:853b2800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b2b8c r4:851cc980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536bc00 r8:851cc9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cc980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cc980 r8:8027f5e8 r7:eb4d9e60 r6:851d6180 r5:8536bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e9fb0 to 0xeb4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e4500 INFO: task kworker/1:601:4949 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: a9f9b000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:602:4950 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:602 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4edd84 r8:00000002 r7:60000013 r6:eb4edd8c r5:8536d400 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8536d400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e002f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b2f8c r4:853b2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b2f8c r4:851cca80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536d400 r8:851ccaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cca80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cca80 r8:8027f5e8 r7:eb4d9e60 r6:851d6200 r5:8536d400 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r4:00000000 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eb4f5d84 r8:00000002 r7:60000113 r6:eb4f5d8c r5:8536ec00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eabad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:853b3f8c r4:851cca00 Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) INFO: task kworker/1:603:4952 is blocked on a mutex likely owned by task kworker/1:288:3824. Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:604:4954 blocked for more than 469 seconds. r5:8536e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e4bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8536e000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07c1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b378c r4:853b3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b378c r4:851ccb00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536e000 r8:851ccb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ccb00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ccb00 r8:8027f5e8 r7:eb4f5e60 r6:851d6300 r5:8536e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e4cc0 INFO: task kworker/1:604:4954 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: aa939000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:605:4956 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:605 state:D stack:0 pid:4956 tgid:4956 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:8536c800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r5:00001000 r4:e8a19000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b3b8c r4:851ccb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8536c800 r8:851ccbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ccb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ccb80 r8:8027f5e8 r7:eb4f5e60 r6:851d6380 r5:8536c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e4c80 INFO: task kworker/1:605:4956 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: aae89000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eb529d84 r8:00000002 r7:60000113 r6:eb529d8c r5:849c0c00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eabf5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:853b438c r4:853b4000 r10:61c88647 r9:849c0c00 r8:851ccc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0631fb0 to 0xe0631ff8) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eb531d84 r8:00000002 r7:60000013 r6:eb531d8c r5:849c0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb531e08 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b4b8c r4:853b4800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b4b8c r4:851ccc80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c0000 r8:851cccac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ccc80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ccc80 r8:8027f5e8 r7:eb529e60 r6:851d6480 r5:849c0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb531fb0 to 0xeb531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489cb40 INFO: task kworker/1:607:4960 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ab06d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eb539d84 r8:00000002 r7:60000113 r6:eb539d8c r5:849c1800 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ead4b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851ccd00 r8:8027f5e8 r7:eb531e60 r6:851d6500 r5:849c1800 INFO: task kworker/1:608:4962 is blocked on a mutex likely owned by task kworker/1:288:3824. 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:609:4964 blocked for more than 469 seconds. r4:849c2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:853b638c r4:853b6000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b638c r4:851ccd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c2400 r8:851ccdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ccd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ccd80 r8:8027f5e8 r7:eb531e60 r6:851d6580 r5:849c2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb541fb0 to 0xeb541ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f20c0 INFO: task kworker/1:609:4964 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ab47e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:610:4966 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:610 state:D stack:0 pid:4966 tgid:4966 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb549d84 r8:00000002 r7:60000013 r6:eb549d8c r5:849c3000 r4:849c3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 r5:00001000 r4:eb029000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:853b4f8c r4:851cce00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eb551d84 r8:00000002 r7:60000013 r6:eb551d8c r5:849c3c00 r5:849c3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb551e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb04b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b538c r4:853b5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b538c r4:851cce80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c3c00 r8:851cceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851cce80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851cce80 r8:8027f5e8 r7:eb541e60 r6:851d6680 r5:849c3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f2440 INFO: task kworker/1:611:4968 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ab9ff000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:00001000 r4:e01cf000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:849c4800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb559e08 r5:00001000 r4:eb05b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:853b578c r4:851ccf00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:613:4973 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:613 state:D stack:0 pid:4973 tgid:4973 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb565d84 r8:00000002 r7:60000113 r6:eb565d8c r5:84976000 r4:84976000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84976000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb565e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84976000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb073000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b5b8c r4:853b5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b5b8c r4:851ccf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84976000 r8:851ccfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851ccf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851ccf80 r8:8027f5e8 r7:eb541e60 r6:851d6780 r5:84976000 Exception stack(0xeb565fb0 to 0xeb565ff8) INFO: task kworker/1:613:4973 is blocked on a mutex likely owned by task kworker/1:288:3824. 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:614 state:D stack:0 pid:4975 tgid:4975 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb08f000 r7:ddde2d80 r6:83018200 r5:853b5f8c r4:853fe000 Exception stack(0xeb56dfb0 to 0xeb56dff8) INFO: task kworker/1:614:4975 is blocked on a mutex likely owned by task kworker/1:288:3824. 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:615:4978 blocked for more than 469 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:615 state:D stack:0 pid:4978 tgid:4978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb579d84 r8:00000002 r7:60000013 r6:eb579d8c r5:85428000 r4:85428000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85428000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb579e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85428000 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 r5:00001000 r4:eb0b5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85428000 r8:853fe0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:8542b000 r4:829188d8 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:853b778c r4:853b7400 r10:00000000 r9:853fe100 r8:8027f5e8 r7:eb579e60 r6:851d6900 r5:8542b000 INFO: task kworker/1:616:4979 is blocked on a mutex likely owned by task kworker/1:288:3824. 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:617:4980 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:617 state:D stack:0 pid:4980 tgid:4980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:853e0c00 r4:853e0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b6b8c r4:853b6800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b6b8c r4:853fe180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e0c00 r8:853fe1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853fe180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fe180 r8:8027f5e8 r7:eb57de60 r6:853fe200 r5:853e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb495fb0 to 0xeb495ff8) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r4:8494cf80 r4:00000001 r4:84be4100 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:853b6f8c r4:853fe280 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:8436478c r4:84364400 Exception stack(0xe0631fb0 to 0xe0631ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:619:4986 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:619 state:D stack:0 pid:4986 tgid:4986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb585d84 r8:00000002 r7:60000113 r6:eb585d8c r5:853e3000 r4:853e3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb585e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f2cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b738c r4:853b7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b738c r4:853fe380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e3000 r8:853fe3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853fe380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fe380 r8:8027f5e8 r7:eb57de60 r6:853fe400 r5:853e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb585fb0 to 0xeb585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f2bc0 INFO: task kworker/1:619:4986 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: acec6000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:620:4987 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:620 state:D stack:0 pid:4987 tgid:4987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4a5d84 r8:00000002 r7:60000113 r6:eb4a5d8c r5:853e3c00 r4:853e3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85411040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb317000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b7f8c r4:853b7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b7f8c r4:853fe480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e3c00 r8:853fe4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853fe480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fe480 r8:8027f5e8 r7:eb57de60 r6:853fe500 r5:853e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f2bc0 INFO: task kworker/1:620:4987 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ad373000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:621:4989 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:621 state:D stack:0 pid:4989 tgid:4989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb595d84 r8:00000002 r7:60000113 r6:eb595d8c r5:8542a400 r4:8542a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8542a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb595e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e40c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8542a400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb305000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:853b7b8c r4:853b7800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:853b7b8c r4:853fe580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542a400 r8:853fe5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853fe580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fe580 r8:8027f5e8 r7:eb4a5e60 r6:851d6980 r5:8542a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb595fb0 to 0xeb595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85411000 INFO: task kworker/1:621:4989 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ad373000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:622:4990 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:622 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb599d84 r8:00000002 r7:60000113 r6:eb599d8c r5:8542bc00 r4:8542bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8542bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85411580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8542bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85498f8c r4:85498c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85498f8c r4:853fe600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542bc00 r8:853fe62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853fe600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fe600 r8:8027f5e8 r7:eb4a5e60 r6:851d6a00 r5:8542bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb599fb0 to 0xeb599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85411000 INFO: task kworker/1:622:4990 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ad6f2000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:e0631dc0 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:623:4992 blocked for more than 470 seconds. Workqueue: events bpf_prog_free_deferred r10:829188dc r9:eb589d84 r8:00000002 r7:60000113 r6:eb589d8c r5:853e4800 r4:853e4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85411240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb327000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549838c r4:85498000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8549838c r4:853fe680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e4800 r8:853fe6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853fe680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fe680 r8:8027f5e8 r7:eb599e60 r6:853fe700 r5:853e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb589fb0 to 0xeb589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85411000 INFO: task kworker/1:623:4992 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ad6f2000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:624:4995 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:624 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:853e5400 r4:853e5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb339000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549878c r4:85498400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8549878c r4:853fe780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e5400 r8:853fe7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853fe780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fe780 r8:8027f5e8 r7:eb599e60 r6:853fe800 r5:853e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85411480 INFO: task kworker/1:624:4995 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: adbc8000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:853e6000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:8436478c r4:84364400 Exception stack(0xe0631fb0 to 0xe0631ff8) Workqueue: events bpf_prog_free_deferred [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb377000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549938c r4:85499000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8549938c r4:853fe980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e6c00 r8:853fe9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853fe980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fe980 r8:8027f5e8 r7:eb599e60 r6:853fea00 r5:853e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb58dfb0 to 0xeb58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85411400 INFO: task kworker/1:626:4998 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: adc72000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:8494cf80 Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:627:5001 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:627 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:853e1800 r4:853e1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854119c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb389000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549978c r4:85499400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8549978c r4:853fea80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e1800 r8:853feaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853fea80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fea80 r8:8027f5e8 r7:eb58de60 r6:853feb00 r5:853e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85411780 INFO: task kworker/1:627:5001 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84be4100 r5:853e0000 r4:829188d8 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85411ac0 r5:00001000 r4:eb391000 r7:ddde2d80 r6:83018200 r5:85499b8c r4:853feb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e0000 r8:853febac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853feb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853feb80 r8:8027f5e8 r7:eb5a9e60 r6:853fec00 r5:853e0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5adfb0 to 0xeb5adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:629 state:D stack:0 pid:5005 tgid:5005 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb3a7000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:629:5005 is blocked on a mutex likely owned by task kworker/1:288:3824. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000001 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:630:5007 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:630 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5b9d84 r8:00000002 r7:60000113 r6:eb5b9d8c r5:854d8c00 r4:854d8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854d8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85411dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 r5:00001000 r4:eb3b3000 r10:61c88647 r9:854d8c00 r8:853fecac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:631:5009 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:631 state:D stack:0 pid:5009 tgid:5009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5bdd84 r8:00000002 r7:60000013 r6:eb5bdd8c r5:854d9800 r4:854d9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854d9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r5:00001000 r4:eb3c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8549a78c r4:853fee80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:82ac11e4 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 task:kworker/1:632 state:D stack:0 pid:5011 tgid:5011 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514c040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854da400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549ab8c r4:8549a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8549ab8c r4:853fef80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854da400 r8:853fefac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853fef80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853fef80 r8:8027f5e8 r7:eb5bde60 r6:85151000 r5:854da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c1fb0 to 0xeb5c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514c000 INFO: task kworker/1:632:5011 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:633:5013 blocked for more than 470 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r5:00001000 r4:eb5d7000 r10:61c88647 r9:854db000 r8:851510ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: aec55000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:8494cf80 r4:00000001 Exception stack(0xe0631fb0 to 0xe0631ff8) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eb5cdd84 r8:00000002 r7:60000013 r6:eb5cdd8c r5:854dbc00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb5c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549af8c r4:8549ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8549af8c r4:85151180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854dbc00 r8:851511ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85151180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151180 r8:8027f5e8 r7:eb5c5e60 r6:85151200 r5:854dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5cdfb0 to 0xeb5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514c180 INFO: task kworker/1:634:5015 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: aecd9000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0631fb0 to 0xe0631ff8) r4:84be4100 r4:854dc800 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514c500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549b78c r4:8549b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8549b78c r4:85151280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854dc800 r8:851512ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85151280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151280 r8:8027f5e8 r7:eb5c5e60 r6:85151300 r5:854dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d5fb0 to 0xeb5d5ff8) r4:8514c3c0 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 INFO: task kworker/1:636:5019 blocked for more than 470 seconds. r4:854dd400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514c6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549bb8c r4:8549b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8549bb8c r4:85151380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854dd400 r8:851513ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85151380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151380 r8:8027f5e8 r7:eb5d5e60 r6:85151400 r5:854dd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514c600 INFO: task kworker/1:636:5019 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: af103000 e01a1000 00000001 80239b98 7f63f000 00000001 r4:00000000 r4:8494cf80 r4:84be4100 r5:854de000 r4:829188d8 r5:00001000 r4:eb5f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8549bf8c r4:8549bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8549bf8c r4:85151480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854de000 r8:851514ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85151480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151480 r8:8027f5e8 r7:eb5e1e60 r6:85151500 r5:854de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e9fb0 to 0xeb5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514c3c0 INFO: task kworker/1:637:5021 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r5:00001000 r4:e01cf000 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:854dec00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8514cac0 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:639 state:D stack:0 pid:5025 tgid:5025 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb613000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:854a4b8c r4:85151680 Exception stack(0xeb5fdfb0 to 0xeb5fdff8) Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:640:5027 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:640 state:D stack:0 pid:5027 tgid:5027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb609d84 r8:00000002 r7:60000013 r6:eb609d8c r5:854e0c00 r4:854e0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854e0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb609e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514cb00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb605000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a478c r4:854a4400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a478c r4:85151780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e0c00 r8:851517ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85151780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151780 r8:8027f5e8 r7:eb5fde60 r6:85151800 r5:854e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb609fb0 to 0xeb609ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:641:5029 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:641 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb611d84 r8:00000002 r7:60000013 r6:eb611d8c r5:854e1800 r4:854e1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854e1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8514cb80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb619000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a4f8c r4:854a4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a4f8c r4:85151880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e1800 r8:851518ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85151880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151880 r8:8027f5e8 r7:eb5fde60 r6:85151900 r5:854e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb611fb0 to 0xeb611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514cf00 INFO: task kworker/1:641:5029 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: afb33000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e0631dc0 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:642:5031 blocked for more than 470 seconds. Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:dfa45000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a538c r4:854a5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a538c r4:85151980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e2400 r8:851519ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85151980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151980 r8:8027f5e8 r7:eb611e60 r6:85151a00 r5:854e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb61dfb0 to 0xeb61dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514cd40 INFO: task kworker/1:642:5031 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b04d0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:643:5032 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:643 state:D stack:0 pid:5032 tgid:5032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb5b5d84 r8:00000002 r7:60000113 r6:eb5b5d8c r5:854e3000 r4:854e3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854e3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:00001000 r4:dff37000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a578c r4:854a5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a578c r4:85151a80 r4:85151a80 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8514cd40 INFO: task kworker/1:643:5032 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b04d0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:644:5035 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:644 state:D stack:0 pid:5035 tgid:5035 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb625d84 r8:00000002 r7:60000113 r6:eb625d8c r5:854e4800 r4:854e4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854e4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb625e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be91c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0875000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a5b8c r4:854a5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a5b8c r4:85151b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e4800 r8:85151bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85151b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151b80 r8:8027f5e8 r7:eb5b5e60 r6:85151c00 r5:854e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be9140 INFO: task kworker/1:644:5035 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b04d0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:645:5037 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:645 state:D stack:0 pid:5037 tgid:5037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3d5d84 r8:00000002 r7:60000113 r6:eb3d5d8c r5:854e5400 r4:854e5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854e5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e49c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a5f8c r4:854a5c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a5f8c r4:85151c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e5400 r8:85151cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85151c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151c80 r8:8027f5e8 r7:eb625e60 r6:85151d00 r5:854e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d5fb0 to 0xeb3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be9180 INFO: task kworker/1:645:5037 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b04d0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:646:5039 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:646 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb3d9d84 r8:00000002 r7:60000113 r6:eb3d9d8c r5:854e6000 r4:854e6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854e6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacaf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a678c r4:854a6400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a678c r4:85151d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e6000 r8:85151dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85151d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151d80 r8:8027f5e8 r7:eb3d5e60 r6:85151e00 r5:854e6000 r4:00000001 Exception stack(0xeb3d9fb0 to 0xeb3d9ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b08b1000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:647:5042 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:647 state:D stack:0 pid:5042 tgid:5042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb4add84 r8:00000002 r7:60000113 r6:eb4add8c r5:854e6c00 r4:854e6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854e6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab57000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a638c r4:854a6000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a638c r4:85151e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e6c00 r8:85151eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85151e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85151e80 r8:8027f5e8 r7:eb3d9e60 r6:85151f00 r5:854e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4adfb0 to 0xeb4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be94c0 INFO: task kworker/1:647:5042 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b0e04000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:648:5043 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:648 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:854e3c00 r4:854e3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854e3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ead17000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb629fb0 to 0xeb629ff8) r4:84be95c0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b0e04000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:649:5044 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:649 state:D stack:0 pid:5044 tgid:5044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb631d84 r8:00000002 r7:60000013 r6:eb631d8c r5:853e8000 r4:853e8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be99c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e8000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a6f8c r4:854a6c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a6f8c r4:84797080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8000 r8:847970ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797080 Exception stack(0xeb631fb0 to 0xeb631ff8) r4:84be96c0 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0631dc0 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:650:5047 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:650 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb63dd84 r8:00000002 r7:60000113 r6:eb63dd8c r5:8542c800 r4:8542c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8542c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb63de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8542c800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a738c r4:854a7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a738c r4:84797180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542c800 r8:847971ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797180 r8:8027f5e8 r7:eb631e60 r6:851d6a80 r5:8542c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb63dfb0 to 0xeb63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be9940 INFO: task kworker/1:650:5047 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b143c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:651:5048 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:651 state:D stack:0 pid:5048 tgid:5048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb641d84 r8:00000002 r7:60000113 r6:eb641d8c r5:8542ec00 r4:8542ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8542ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb641e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8542ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf57000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a7f8c r4:854a7c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a7f8c r4:84797200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542ec00 r8:8479722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797200 r8:8027f5e8 r7:eb63de60 r6:851d6b00 r5:8542ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb641fb0 to 0xeb641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be9940 INFO: task kworker/1:651:5048 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b143c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:652:5050 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:652 state:D stack:0 pid:5050 tgid:5050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb649d84 r8:00000002 r7:60000113 r6:eb649d8c r5:8542d400 r4:8542d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8542d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb649e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8542d400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a778c r4:854a7400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a778c r4:84797280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542d400 r8:847972ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797280 r8:8027f5e8 r7:eb641e60 r6:851d6b80 r5:8542d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb649fb0 to 0xeb649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be9a80 INFO: task kworker/1:652:5050 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b186a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84be4100 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb645d84 r8:00000002 r7:60000013 r6:eb645d8c r5:853e8c00 r4:853e8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853e8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb645e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be9e00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854a7b8c r4:854a7800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854a7b8c r4:84797300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853e8c00 r8:8479732c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797300 r8:8027f5e8 r7:eb641e60 r6:84797380 r5:853e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb645fb0 to 0xeb645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be9dc0 INFO: task kworker/1:653:5053 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b186a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:654:5054 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:654 state:D stack:0 pid:5054 tgid:5054 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb651d84 r8:00000002 r7:60000113 r6:eb651d8c r5:8542e000 r4:8542e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8542e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb651e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849164c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8542e000 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b0f8c r4:854b0c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b0f8c r4:84797400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8542e000 r8:8479742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797400 r8:8027f5e8 r7:eb641e60 r6:851d6c00 r5:8542e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb651fb0 to 0xeb651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be9dc0 INFO: task kworker/1:654:5054 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b218d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:655:5057 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:655 state:D stack:0 pid:5057 tgid:5057 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb65dd84 r8:00000002 r7:60000113 r6:eb65dd8c r5:849c5400 r4:849c5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849c5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb65de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b038c r4:854b0000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b038c r4:84797480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849c5400 r8:847974ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797480 r8:8027f5e8 r7:eb651e60 r6:851d6c80 r5:849c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb65dfb0 to 0xeb65dff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:656 state:D stack:0 pid:5058 tgid:5058 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eafc3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:849c6c00 r8:8479752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b218d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:657:5060 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:657 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb669d84 r8:00000002 r7:60000113 r6:eb669d8c r5:849c6000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb669e08 r9:83018205 r8:849c6000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 r5:00001000 r4:eafdd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:849c6000 r8:847975ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:829188dc r9:eb66dd84 r8:00000002 r7:60000113 r6:eb66dd8c r5:84958000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r9:83018205 r8:84958000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:00001000 r4:e01af000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b178c r4:854b1400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b178c r4:84797600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84958000 r8:8479762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797600 r8:8027f5e8 r7:eb651e60 r6:851d6e00 r5:84958000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb66dfb0 to 0xeb66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849162c0 INFO: task kworker/1:658:5061 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b2801000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:659:5066 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:659 state:D stack:0 pid:5066 tgid:5066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb561d84 r8:00000002 r7:60000113 r6:eb561d8c r5:84958c00 r4:84958c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84958c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84958c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa87000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b138c r4:854b1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b138c r4:84797680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84958c00 r8:847976ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797680 r8:8027f5e8 r7:eb66de60 r6:851d6e80 r5:84958c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb561fb0 to 0xeb561ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916600 INFO: task kworker/1:659:5066 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b2801000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:660:5067 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:660 state:D stack:0 pid:5067 tgid:5067 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb569d84 r8:00000002 r7:60000113 r6:eb569d8c r5:8495b000 r4:8495b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495b000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb151000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b3b8c r4:854b3800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b3b8c r4:84797700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495b000 r8:8479772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797700 r8:8027f5e8 r7:eb66de60 r6:851d6f00 r5:8495b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb569fb0 to 0xeb569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916600 INFO: task kworker/1:660:5067 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:661:5068 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:661 state:D stack:0 pid:5068 tgid:5068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb571d84 r8:00000002 r7:60000113 r6:eb571d8c r5:84959800 r4:84959800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84959800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84959800 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0711000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b1b8c r4:854b1800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b1b8c r4:84797780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84959800 r8:847977ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797780 r8:8027f5e8 r7:eb569e60 r6:851d6f80 r5:84959800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb571fb0 to 0xeb571ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916600 INFO: task kworker/1:661:5068 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b3178000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:662:5070 blocked for more than 470 seconds. r4:8495c800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb675e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495c800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b1f8c r4:854b1c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b1f8c r4:84797800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495c800 r8:8479782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797800 r8:8027f5e8 r7:eb569e60 r6:85002000 r5:8495c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb675fb0 to 0xeb675ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916840 INFO: task kworker/1:662:5070 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b3238000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eabed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:854b238c r4:84797880 Exception stack(0xeb67dfb0 to 0xeb67dff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e01cf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eaed3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:854b278c r4:84797900 Exception stack(0xeb685fb0 to 0xeb685ff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b37bf000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:665:5076 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:665 state:D stack:0 pid:5076 tgid:5076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb68dd84 r8:00000002 r7:60000013 r6:eb68dd8c r5:8495a400 r4:8495a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb68de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb053000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b2b8c r4:854b2800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b2b8c r4:84797980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495a400 r8:847979ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797980 r8:8027f5e8 r7:eb569e60 r6:85002180 r5:8495a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb68dfb0 to 0xeb68dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916b80 INFO: task kworker/1:665:5076 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b39d4000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:666:5079 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:666 state:D stack:0 pid:5079 tgid:5079 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb695d84 r8:00000002 r7:60000013 r6:eb695d8c r5:8495ec00 r4:8495ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8495ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb695e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84916e00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8495ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb071000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b2f8c r4:854b2c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b2f8c r4:84797a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8495ec00 r8:84797a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797a00 r8:8027f5e8 r7:eb569e60 r6:85002200 r5:8495ec00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:00000000 r5:8436478c r4:84364400 r4:8494cf80 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:667:5081 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:667 state:D stack:0 pid:5081 tgid:5081 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6a1d84 r8:00000002 r7:60000013 r6:eb6a1d8c r5:844b9800 r4:844b9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844b9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8489ce00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb091000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b338c r4:854b3000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b338c r4:84797a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b9800 r8:84797aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797a80 r8:8027f5e8 r7:eb569e60 r6:85002280 r5:844b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a1fb0 to 0xeb6a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8489cc40 INFO: task kworker/1:667:5081 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b3fc7000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:668:5083 blocked for more than 470 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:668 state:D stack:0 pid:5083 tgid:5083 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6a5d84 r8:00000002 r7:60000113 r6:eb6a5d8c r5:844b8000 r4:844b8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844b8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85000940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0af000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b378c r4:854b3400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b378c r4:84797b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b8000 r8:84797b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797b00 r8:8027f5e8 r7:eb569e60 r6:85002300 r5:844b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a5fb0 to 0xeb6a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85000580 INFO: task kworker/1:668:5083 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b407b000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:669:5086 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:669 state:D stack:0 pid:5086 tgid:5086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6a9d84 r8:00000002 r7:60000013 r6:eb6a9d8c r5:844ba400 r4:844ba400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844ba400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e64c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b4b8c r4:854b4800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b4b8c r4:84797b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844ba400 r8:84797bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797b80 r8:8027f5e8 r7:eb569e60 r6:85002380 r5:844ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6a9fb0 to 0xeb6a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850001c0 INFO: task kworker/1:669:5086 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b47fa000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:670:5088 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:670 state:D stack:0 pid:5088 tgid:5088 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6b1d84 r8:00000002 r7:60000113 r6:eb6b1d8c r5:844bbc00 r4:844bbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b3f8c r4:854b3c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b3f8c r4:84797c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844bbc00 r8:84797c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797c00 r8:8027f5e8 r7:eb6a9e60 r6:85002400 r5:844bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b1fb0 to 0xeb6b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e6100 INFO: task kworker/1:670:5088 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b47fa000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:671 state:D stack:0 pid:5089 tgid:5089 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:829188dc r9:eb64dd84 r8:00000002 r7:60000013 r6:eb64dd8c r5:853ea400 r4:853ea400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853ea400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb64de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e61c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853ea400 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b438c r4:854b4000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b438c r4:84797c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ea400 r8:84797cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797c80 r8:8027f5e8 r7:eb6a9e60 r6:84797d00 r5:853ea400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb64dfb0 to 0xeb64dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e6100 INFO: task kworker/1:671:5089 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b4a8e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:eb6b5d84 r8:00000002 r7:60000013 r6:eb6b5d8c r5:853ebc00 r4:00000000 r4:00000000 r5:00001000 r4:eb1d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853ebc00 r8:84797dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:673:5093 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:673 state:D stack:0 pid:5093 tgid:5093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6b9d84 r8:00000002 r7:60000113 r6:eb6b9d8c r5:853ec800 r4:853ec800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853ec800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e6600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb201000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b4f8c r4:854b4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b4f8c r4:84797e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ec800 r8:84797eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797e80 r8:8027f5e8 r7:eb6a9e60 r6:84797f00 r5:853ec800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6b9fb0 to 0xeb6b9ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0631d28 to 0xe0631d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e66c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853ed400 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb217000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b538c r4:854b5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b538c r4:84797f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853ed400 r8:84797fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84797f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84797f80 r8:8027f5e8 r7:eb6b9e60 r6:85003000 r5:853ed400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6bdfb0 to 0xeb6bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e6580 INFO: task kworker/1:674:5096 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b524b000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:675 state:D stack:0 pid:5098 tgid:5098 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c1e08 r5:00001000 r4:eb25f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb6c1fb0 to 0xeb6c1ff8) r4:851e6700 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:676:5100 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:676 state:D stack:0 pid:5100 tgid:5100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6c5d84 r8:00000002 r7:60000013 r6:eb6c5d8c r5:853eec00 r4:853eec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:853eec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e68c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb233000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b578c r4:854b5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b578c r4:85003180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853eec00 r8:850031ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003180 r8:8027f5e8 r7:eb6c1e60 r6:85003200 r5:853eec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c5fb0 to 0xeb6c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:8494cf80 Exception stack(0xe0631fb0 to 0xe0631ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853eb000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6c9e08 r5:00001000 r4:eb24b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b5b8c r4:85003280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:853eb000 r8:850032ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003280 r8:8027f5e8 r7:eb6c1e60 r6:85003300 r5:853eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6c9fb0 to 0xeb6c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e6a40 INFO: task kworker/1:677:5102 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b6831000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:678:5104 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:678 state:D stack:0 pid:5104 tgid:5104 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb635e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb275000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:853e9800 r8:850033ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:679:5106 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:679 state:D stack:0 pid:5106 tgid:5106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6d1d84 r8:00000002 r7:60000013 r6:eb6d1d8c r5:85429800 r4:85429800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85429800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b678c r4:854b6400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b678c r4:85003480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85429800 r8:850034ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003480 r8:8027f5e8 r7:eb635e60 r6:85003500 r5:85429800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d1fb0 to 0xeb6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e6fc0 INFO: task kworker/1:679:5106 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:680:5108 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:680 state:D stack:0 pid:5108 tgid:5108 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6d5d84 r8:00000002 r7:60000013 r6:eb6d5d8c r5:854e8000 r4:854e8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854e8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb2eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:854b6b8c r4:85003580 Exception stack(0xeb6d5fb0 to 0xeb6d5ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:681:5110 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:681 state:D stack:0 pid:5110 tgid:5110 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6d9d84 r8:00000002 r7:60000113 r6:eb6d9d8c r5:854e8c00 r4:854e8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854e8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d01c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854e8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb303000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b6f8c r4:854b6c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b6f8c r4:85003680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854e8c00 r8:850036ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003680 r8:8027f5e8 r7:eb6d5e60 r6:85003700 r5:854e8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d9fb0 to 0xeb6d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d0300 INFO: task kworker/1:681:5110 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:682 state:D stack:0 pid:5113 tgid:5113 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d0600 r5:00001000 r4:eb361000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:683:5114 blocked for more than 471 seconds. task:kworker/1:683 state:D stack:0 pid:5114 tgid:5114 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb319000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb6e9fb0 to 0xeb6e9ff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:684:5115 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:684 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb6edd84 r8:00000002 r7:60000113 r6:eb6edd8c r5:844bc800 r4:844bc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:844bc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d0540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb331000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854b778c r4:854b7400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854b778c r4:85003900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844bc800 r8:8500392c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003900 r8:8027f5e8 r7:eb6e1e60 r6:85002500 r5:844bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6edfb0 to 0xeb6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d0340 INFO: task kworker/1:684:5115 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b8194000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f5e08 r5:00001000 r4:eb4bb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854beb8c r4:854be800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854beb8c r4:85003980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844bd400 r8:850039ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003980 r8:8027f5e8 r7:eb6e1e60 r6:85002580 r5:844bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f5fb0 to 0xeb6f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d0500 INFO: task kworker/1:685:5117 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b8c27000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d0740 r5:00001000 r4:eb375000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:854b7f8c r4:85003a00 Exception stack(0xeb6fdfb0 to 0xeb6fdff8) r4:851d0640 INFO: task kworker/1:686:5119 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b9483000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 r4:844bec00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb38b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:688 state:D stack:0 pid:5123 tgid:5123 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d0a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb39f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bc78c r4:854bc400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bc78c r4:85003b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:844b8c00 r8:85003b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003b00 r8:8027f5e8 r7:eb6f5e60 r6:85002700 r5:844b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb70dfb0 to 0xeb70dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d0840 INFO: task kworker/1:688:5123 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: b9aac000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:689:5125 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:689 state:D stack:0 pid:5125 tgid:5125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb3bb000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85003b80 r8:8027f5e8 r7:eb6f5e60 r6:85002780 r5:83af0c00 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb3cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bcf8c r4:85003c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af0000 r8:85003c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003c00 r8:8027f5e8 r7:eb6f5e60 r6:85002800 r5:83af0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb71dfb0 to 0xeb71dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d0ac0 INFO: task kworker/1:690:5127 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ba2a7000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84be4100 task:kworker/1:691 state:D stack:0 pid:5129 tgid:5129 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d0d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83af1800 r7:00000000 r6:83018200 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bd38c r4:854bd000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bd38c r4:85003c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af1800 r8:85003cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003c80 r8:8027f5e8 r7:eb6f5e60 r6:85002880 r5:83af1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb725fb0 to 0xeb725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d0bc0 INFO: task kworker/1:691:5129 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ba2a7000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:692:5131 blocked for more than 471 seconds. Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb44d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:854bd78c r4:85003d00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be4100 task:kworker/1:693 state:D stack:0 pid:5133 tgid:5133 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850001c0 r5:00001000 r4:eb463000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bdb8c r4:854bd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bdb8c r4:85003d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af3000 r8:85003dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003d80 r8:8027f5e8 r7:eb6f5e60 r6:85002980 r5:83af3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb735fb0 to 0xeb735ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84916180 INFO: task kworker/1:693:5133 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ba809000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8494cf80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:694 state:D stack:0 pid:5135 tgid:5135 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb48f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:83af3c00 r8:85003e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85410680 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:695 state:D stack:0 pid:5137 tgid:5137 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5180 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854be38c r4:854be000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854be38c r4:85003e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af4800 r8:85003eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003e80 r8:8027f5e8 r7:eb6f5e60 r6:85002a80 r5:83af4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f5080 INFO: task kworker/1:695:5137 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bae6a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:83af5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r5:00001000 r4:eb4b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854be78c r4:854be400 r4:85003f00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:697:5141 blocked for more than 471 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:697 state:D stack:0 pid:5141 tgid:5141 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb755d84 r8:00000002 r7:60000113 r6:eb755d8c r5:83af6000 r4:83af6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:83af6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb755e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83af6000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa59000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bf38c r4:854bf000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bf38c r4:85003f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:83af6000 r8:85003fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85003f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85003f80 r8:8027f5e8 r7:eb6f5e60 r6:85002b80 r5:83af6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb755fb0 to 0xeb755ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f5280 INFO: task kworker/1:697:5141 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bb1f7000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:e0631dc0 r5:00001000 r4:e01cf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb75de08 r5:00001000 r4:eb4c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:851e1000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e1000 r8:8027f5e8 r7:eb755e60 r6:85002c00 r5:83af6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb75dfb0 to 0xeb75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f53c0 INFO: task kworker/1:698:5143 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bb47d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:699:5145 blocked for more than 472 seconds. r5:85450000 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eae5f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:85450000 r8:851e10ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb761fb0 to 0xeb761ff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac53000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bf78c r4:854bf400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bf78c r4:851e1100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854eb000 r8:851e112c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e1100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e1100 r8:8027f5e8 r7:eb761e60 r6:851e1180 r5:854eb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6cdfb0 to 0xeb6cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f5500 INFO: task kworker/1:700:5148 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bb794000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:312 state:D stack:0 pid:5154 tgid:5154 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018005 r8:85450c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Exception stack(0xeb6e5fb0 to 0xeb6e5ff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:313 state:D stack:0 pid:5155 tgid:5155 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e3a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85451800 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb657000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533638c r4:85336000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533638c r4:85002e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85451800 r8:85002e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85002e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002e00 r8:8027f5e8 r7:eb6e5e60 r6:85002e80 r5:85451800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb759fb0 to 0xeb759ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e30c0 INFO: task kworker/0:313:5155 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bbc37000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be4100 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eaf49000 r5:854c038c r4:854c0000 r10:61c88647 r9:85452400 r8:851e122c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0631d28 to 0xe0631d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb775d84 r8:00000002 r7:60000113 r6:eb775d8c r5:85453000 r4:85453000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85453000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb775e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85453000 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf1b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854bff8c r4:854bfc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854bff8c r4:851e1280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85453000 r8:851e12ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e1280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e1280 r8:8027f5e8 r7:eb771e60 r6:85002f80 r5:85453000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb775fb0 to 0xeb775ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f5b80 INFO: task kworker/1:702:5158 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bc0d9000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:82ac11e4 r5:00001000 r4:e01cf000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/1:704 state:D stack:0 pid:5162 tgid:5162 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85456000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c078c r4:854c0400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c078c r4:851e1380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85456000 r8:851e13ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e1380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e1380 r8:8027f5e8 r7:eb781e60 r6:851e2080 r5:85456000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb785fb0 to 0xeb785ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f5f80 INFO: task kworker/1:704:5162 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/1:705:5164 blocked for more than 472 seconds. r4:00000000 r5:00001000 r4:eafd9000 r5:854c0b8c r4:854c0800 Exception stack(0xeb78dfb0 to 0xeb78dff8) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:854ebc00 r4:829188d8 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d4040 r5:854c0f8c r4:854c0c00 r4:851e1480 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bcb46000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:707:5169 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:707 state:D stack:0 pid:5169 tgid:5169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb791d84 r8:00000002 r7:60000013 r6:eb791d8c r5:854ec800 r4:854ec800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854ec800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb791e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d4340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854ec800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb50d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c178c r4:854c1400 r10:61c88647 r9:854ec800 r8:851e15ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb795e08 r5:00001000 r4:eb535000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:709:5173 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:709 state:D stack:0 pid:5173 tgid:5173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb799d84 r8:00000002 r7:60000113 r6:eb799d8c r5:854ee000 r4:854ee000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb52b000 r5:854c1b8c r4:854c1800 r4:851e1780 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-syzkaller #0 r5:854eec00 r4:829188d8 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 r4:854d4600 r4:00000000 Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bd752000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:711:5177 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:711 state:D stack:0 pid:5177 tgid:5177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:854ea400 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb543000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8495bc00 r4:829188d8 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d4a40 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854d4840 INFO: task kworker/1:712:5178 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bdf40000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:713:5181 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 task:kworker/1:713 state:D stack:0 pid:5181 tgid:5181 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb591000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:854c2f8c r4:851e1b80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:714 state:D stack:0 pid:5183 tgid:5183 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb5c7000 r5:854c338c r4:854c3000 r4:851e1c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:854d4bc0 INFO: task kworker/1:714:5183 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bdffc000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:715:5185 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:715 state:D stack:0 pid:5185 tgid:5185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb7b5d84 r8:00000002 r7:60000113 r6:eb7b5d8c r5:854f1800 r4:854f1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f5880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 r5:00001000 r4:eb5d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:854f1800 r8:851e1dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:716:5187 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:716 state:D stack:0 pid:5187 tgid:5187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb7b9d84 r8:00000002 r7:60000113 r6:eb7b9d8c r5:854f3000 r4:854f3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85519280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb601000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854c3f8c r4:854c3c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854c3f8c r4:851e1e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f3000 r8:851e1eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851e1e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e1e80 r8:8027f5e8 r7:eb7b5e60 r6:851e1f00 r5:854f3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b9fb0 to 0xeb7b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:717 state:D stack:0 pid:5188 tgid:5188 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85519100 r5:00001000 r4:eb5e5000 r5:854c3b8c r4:854c3800 r4:851e1f80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:718:5191 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:718 state:D stack:0 pid:5191 tgid:5191 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb7c1d84 r8:00000002 r7:60000013 r6:eb7c1d8c r5:854f2400 r4:854f2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85519480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb60d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:854f2400 r8:8551a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:719 state:D stack:0 pid:5193 tgid:5193 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c5e08 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85519700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cc78c r4:854cc400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854cc78c r4:8551a180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f6000 r8:8551a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8551a180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551a180 r8:8027f5e8 r7:eb7c1e60 r6:8551a200 r5:854f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85519500 INFO: task kworker/1:719:5193 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bedd7000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:720:5194 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:720 state:D stack:0 pid:5194 tgid:5194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb779d84 r8:00000002 r7:60000013 r6:eb779d8c r5:854f5400 r4:854f5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85519880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb62d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ccb8c r4:854cc800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ccb8c r4:8551a280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f5400 r8:8551a2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8551a280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551a280 r8:8027f5e8 r7:eb7c5e60 r6:8551a300 r5:854f5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb779fb0 to 0xeb779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85519180 INFO: task kworker/1:720:5194 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bf175000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:721:5197 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:721 state:D stack:0 pid:5197 tgid:5197 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb7cdd84 r8:00000002 r7:60000013 r6:eb7cdd8c r5:854f8000 r4:854f8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f8000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaa7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cd38c r4:854cd000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854cd38c r4:8551a380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f8000 r8:8551a3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8551a380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551a380 r8:8027f5e8 r7:eb779e60 r6:8551a400 r5:854f8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7cdfb0 to 0xeb7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855196c0 INFO: task kworker/1:721:5197 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bf175000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:82ac11e4 r4:e0631dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:829188dc r9:eb7d1d84 r8:00000002 r7:60000013 r6:eb7d1d8c r5:854f8c00 r4:00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849794c0 r5:00001000 r4:e092b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ccf8c r4:854ccc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ccf8c r4:8551a480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f8c00 r8:8551a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8551a480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551a480 r8:8027f5e8 r7:eb7cde60 r6:8551a500 r5:854f8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855196c0 INFO: task kworker/1:722:5198 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bf847000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:314:5201 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:314 state:D stack:0 pid:5201 tgid:5201 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb7e1d84 r8:00000002 r7:60000113 r6:eb7e1d8c r5:854fb000 r4:854fb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854fb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e3400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85336b8c r4:85336800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85336b8c r4:851e2180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fb000 r8:851e21ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e2180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2180 r8:8027f5e8 r7:eb6e5e60 r6:8551a580 r5:854fb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7e1fb0 to 0xeb7e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e3c40 INFO: task kworker/0:314:5201 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bf847000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:5202 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:5202 tgid:5202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb7edd84 r8:00000002 r7:60000113 r6:eb7edd8c r5:854fbc00 r4:854fbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854fbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb817000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85337b8c r4:85337800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85337b8c r4:851e2200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xeb7edfb0 to 0xeb7edff8) Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:316 state:D stack:0 pid:5203 tgid:5203 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85007b80 r5:00001000 r4:eb7e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85336f8c r4:85336c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85336f8c r4:851e2280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fc800 r8:851e22ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e2280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2280 r8:8027f5e8 r7:eb7ede60 r6:8551a680 r5:854fc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f5fb0 to 0xeb7f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e3c40 INFO: task kworker/0:316:5203 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: bffc0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r5:8436478c r4:84364400 Exception stack(0xe0631fb0 to 0xe0631ff8) Call trace: r4:00000000 r5:00001000 r4:eb803000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7c9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85453c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb809000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8533778c r4:85337400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8533778c r4:851e2380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85453c00 r8:851e23ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e2380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2380 r8:8027f5e8 r7:eb7ede60 r6:851e2400 r5:85453c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c9fb0 to 0xeb7c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550f140 INFO: task kworker/0:318:5207 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c0709000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r4:00000000 r5:8436478c r4:84364400 r4:8494cf80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:320 state:D stack:0 pid:5212 tgid:5212 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d5e08 r9:83018005 r8:849b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 r5:00001000 r4:eb81d000 r7:dddced80 r6:83018000 r5:85337f8c r4:851e2580 Exception stack(0xeb7d5fb0 to 0xeb7d5ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:5214 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:5214 tgid:5214 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb821d84 r8:00000002 r7:60000113 r6:eb821d8c r5:849b0c00 r4:849b0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849b0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550f740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb831000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a3038c r4:84a30000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3038c r4:851e2680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b0c00 r8:851e26ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e2680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2680 r8:8027f5e8 r7:eb80de60 r6:851e2700 r5:849b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb821fb0 to 0xeb821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550f540 INFO: task kworker/0:321:5214 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c0bc4000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 Exception stack(0xe0631fb0 to 0xe0631ff8) Call trace: r4:00000000 r5:00001000 r4:eb83f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8439ff8c r4:8439fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8439ff8c r4:851e2780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b1800 r8:851e27ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e2780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2780 r8:8027f5e8 r7:eb821e60 r6:851e2800 r5:849b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb835fb0 to 0xeb835ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550f680 INFO: task kworker/0:322:5216 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c10ac000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb83de08 r5:00001000 r4:eb845000 r7:dddced80 r6:83018000 r5:8439fb8c r4:851e2880 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 INFO: task kworker/0:324:5221 blocked for more than 472 seconds. [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8547c38c r4:8547c000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:82ac11e4 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r4:8494cf80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:325 state:D stack:0 pid:5222 tgid:5222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb829d84 r8:00000002 r7:60000013 r6:eb829d8c r5:849b3c00 r4:849b3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849b3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb829e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb03d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cdb8c r4:854cd800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:854cdb8c r4:851e2a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b3c00 r8:851e2aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e2a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2a80 r8:8027f5e8 r7:eb851e60 r6:851e2b00 r5:849b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb829fb0 to 0xeb829ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550f940 INFO: task kworker/0:325:5222 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r5:8436478c r4:84364400 1fa0: 00000000 00000000 00000000 00000000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:00001000 r4:eabcf000 r7:dddced80 r6:83018000 r5:8547cb8c r4:851e2b80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11e4 r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:5232 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:5232 tgid:5232 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:00000000 r5:00001000 r4:eb07d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8547cf8c r4:851e2c80 r10:00000000 r9:851e2c80 r8:8027f5e8 r7:eb829e60 r6:851e2d00 r5:849b6c00 r4:853f6180 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:328:5233 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:328 state:D stack:0 pid:5233 tgid:5233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb739d84 r8:00000002 r7:60000013 r6:eb739d8c r5:84a70000 r4:84a70000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a70000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb739e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a70000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb18f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547d78c r4:8547d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547d78c r4:851e2d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a70000 r8:851e2dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e2d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e2d80 r8:8027f5e8 r7:eb6f9e60 r6:851e2e00 r5:84a70000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f6040 INFO: task kworker/0:328:5233 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c2253000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:723:5235 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:723 state:D stack:0 pid:5235 tgid:5235 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb741d84 r8:00000002 r7:60000013 r6:eb741d8c r5:84a70c00 r4:84a70c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a70c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb00b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cd78c r4:854cd400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854cd78c r4:8551a780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a70c00 r8:8551a7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8551a780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551a780 r8:8027f5e8 r7:eb7cde60 r6:851e2e80 r5:84a70c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb741fb0 to 0xeb741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e0740 INFO: task kworker/1:723:5235 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c2631000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:724:5236 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:724 state:D stack:0 pid:5236 tgid:5236 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb749d84 r8:00000002 r7:60000113 r6:eb749d8c r5:84a71800 r4:84a71800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a71800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851689c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a71800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb689000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cdf8c r4:854cdc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854cdf8c r4:8551a800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a71800 r8:8551a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8551a800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551a800 r8:8027f5e8 r7:eb741e60 r6:851e2f00 r5:84a71800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb749fb0 to 0xeb749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e0740 INFO: task kworker/1:724:5236 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c2631000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:725:5237 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:725 state:D stack:0 pid:5237 tgid:5237 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb869d84 r8:00000002 r7:60000013 r6:eb869d8c r5:84a72400 r4:84a72400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a72400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a72400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547d38c r4:8547d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547d38c r4:8551a880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a72400 r8:8551a8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8551a880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551a880 r8:8027f5e8 r7:eb749e60 r6:851e2f80 r5:84a72400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb869fb0 to 0xeb869ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e0740 INFO: task kworker/1:725:5237 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c2be3000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:726:5238 blocked for more than 472 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:726 state:D stack:0 pid:5238 tgid:5238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb699d84 r8:00000002 r7:60000113 r6:eb699d8c r5:854f9800 r4:854f9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb699e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85168bc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:854f9800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548678c r4:85486400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8548678c r4:8551a900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f9800 r8:8551a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8551a900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8551a900 r8:8027f5e8 r7:eb749e60 r6:8551a980 r5:854f9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb699fb0 to 0xeb699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e0740 INFO: task kworker/1:726:5238 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c2be3000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:329:5240 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:329 state:D stack:0 pid:5240 tgid:5240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb871d84 r8:00000002 r7:60000113 r6:eb871d8c r5:854fe000 r4:854fe000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854fe000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb871e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f68c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1bb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547db8c r4:8547d800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547db8c r4:85401000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854fe000 r8:8540102c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401000 r8:8027f5e8 r7:eb739e60 r6:8551aa00 r5:854fe000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb871fb0 to 0xeb871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f6700 INFO: task kworker/0:329:5240 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c2be3000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:330:5243 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:330 state:D stack:0 pid:5243 tgid:5243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb87dd84 r8:00000002 r7:60000013 r6:eb87dd8c r5:854f6c00 r4:854f6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f69c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:854f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547df8c r4:8547dc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547df8c r4:85401080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:854f6c00 r8:854010ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401080 r8:8027f5e8 r7:eb871e60 r6:8551aa80 r5:854f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb87dfb0 to 0xeb87dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f6800 INFO: task kworker/0:330:5243 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c31c3000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:331:5244 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:331 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: r5:854fec00 r4:829188d8 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6a80 r5:00001000 r4:eb1fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb881fb0 to 0xeb881ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d20: c31c3000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:332:5246 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:332 state:D stack:0 pid:5246 tgid:5246 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb885d84 r8:00000002 r7:60000013 r6:eb885d8c r5:85500000 r4:85500000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85500000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85500000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb241000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547eb8c r4:8547e800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547eb8c r4:85401180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85500000 r8:854011ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401180 r8:8027f5e8 r7:eb881e60 r6:8551ab80 r5:85500000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb885fb0 to 0xeb885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f6940 INFO: task kworker/0:332:5246 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c3639000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:333:5247 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:333 state:D stack:0 pid:5247 tgid:5247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb889d84 r8:00000002 r7:60000013 r6:eb889d8c r5:85500c00 r4:85500c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85500c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb889e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85500c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb223000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547e78c r4:8547e400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547e78c r4:85401200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85500c00 r8:8540122c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401200 r8:8027f5e8 r7:eb885e60 r6:8551ac00 r5:85500c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb889fb0 to 0xeb889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f6e00 INFO: task kworker/0:333:5247 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0631dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85502400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb891e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85502400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547ff8c r4:8547fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547ff8c r4:85401280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85502400 r8:854012ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401280 r8:8027f5e8 r7:eb885e60 r6:8551ac80 r5:85502400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb891fb0 to 0xeb891ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f6e40 INFO: task kworker/0:334:5250 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c3a76000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0631fb0 to 0xe0631ff8) r4:84be4100 task:kworker/0:335 state:D stack:0 pid:5251 tgid:5251 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6b80 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb269000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547ef8c r4:8547ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547ef8c r4:85401300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85503000 r8:8540132c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401300 r8:8027f5e8 r7:eb891e60 r6:8551ad00 r5:85503000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f6e40 INFO: task kworker/0:335:5251 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c3a76000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 INFO: task kworker/0:336:5253 blocked for more than 473 seconds. Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb89dd84 r8:00000002 r7:60000013 r6:eb89dd8c r5:85501800 r4:85501800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85501800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb89de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85501800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547f38c r4:8547f000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547f38c r4:85401380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85501800 r8:854013ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401380 r8:8027f5e8 r7:eb891e60 r6:8551ad80 r5:85501800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb89dfb0 to 0xeb89dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85404000 INFO: task kworker/0:336:5253 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c41fe000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:337 state:D stack:0 pid:5255 tgid:5255 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404180 r5:00001000 r4:eb2ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547f78c r4:8547f400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547f78c r4:85401400 r10:61c88647 r9:85503c00 r8:8540142c r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c41fe000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:5257 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:5257 tgid:5257 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8add84 r8:00000002 r7:60000013 r6:eb8add8c r5:85504800 r4:85504800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85504800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85504800 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8547fb8c r4:8547f800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547fb8c r4:85401480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85504800 r8:854014ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401480 r8:8027f5e8 r7:eb891e60 r6:8551ae80 r5:85504800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8adfb0 to 0xeb8adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85404140 INFO: task kworker/0:338:5257 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:339:5261 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:339 state:D stack:0 pid:5261 tgid:5261 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8b5d84 r8:00000002 r7:60000113 r6:eb8b5d8c r5:85506c00 r4:85506c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85506c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85506c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb36d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a30b8c r4:84a30800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a30b8c r4:85401500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85506c00 r8:8540152c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401500 r8:8027f5e8 r7:eb891e60 r6:8551af00 r5:85506c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b5fb0 to 0xeb8b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85404140 INFO: task kworker/0:339:5261 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c49e9000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e01cf000 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:829188dc r9:eb8b9d84 r8:00000002 r7:60000013 r6:eb8b9d8c r5:85505400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404cc0 r5:00001000 r4:eb499000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548578c r4:85485400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548578c r4:85401580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85505400 r8:854015ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401580 r8:8027f5e8 r7:eb8b5e60 r6:8551af80 r5:85505400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8b9fb0 to 0xeb8b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85404140 INFO: task kworker/0:340:5262 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c49e9000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:341:5264 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:341 state:D stack:0 pid:5264 tgid:5264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8c1d84 r8:00000002 r7:60000113 r6:eb8c1d8c r5:855b0000 r4:855b0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854046c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b0000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb38f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548438c r4:85484000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548438c r4:85401600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0000 r8:8540162c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401600 r8:8027f5e8 r7:eb8b9e60 r6:851d1000 r5:855b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c1fb0 to 0xeb8c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85404700 INFO: task kworker/0:341:5264 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c4ea4000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:5266 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:5266 tgid:5266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8c9d84 r8:00000002 r7:60000113 r6:eb8c9d8c r5:855b1800 r4:855b1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8c9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b1800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548478c r4:85484400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548478c r4:85401680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b1800 r8:854016ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401680 r8:8027f5e8 r7:eb8b9e60 r6:851d1080 r5:855b1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8c9fb0 to 0xeb8c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85404700 INFO: task kworker/0:342:5266 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c4ea4000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:343:5267 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:343 state:D stack:0 pid:5267 tgid:5267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8cdd84 r8:00000002 r7:60000013 r6:eb8cdd8c r5:855b2400 r4:855b2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb3db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85484b8c r4:85484800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85484b8c r4:85401700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b2400 r8:8540172c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401700 r8:8027f5e8 r7:eb8b9e60 r6:851d1100 r5:855b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854047c0 INFO: task kworker/0:343:5267 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c53cc000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:5269 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:5269 tgid:5269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8a9d84 r8:00000002 r7:60000013 r6:eb8a9d8c r5:84a73000 r4:84a73000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a73000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8a9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a73000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb44b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85484f8c r4:85484c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85484f8c r4:85401780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a73000 r8:854017ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401780 r8:8027f5e8 r7:eb8b9e60 r6:85401800 r5:84a73000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85404bc0 INFO: task kworker/0:344:5269 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c53cc000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:345:5273 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:345 state:D stack:0 pid:5273 tgid:5273 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8d1d84 r8:00000002 r7:60000113 r6:eb8d1d8c r5:84a75400 r4:84a75400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a75400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85404c00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb465000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548538c r4:85485000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548538c r4:85401880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a75400 r8:854018ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401880 r8:8027f5e8 r7:eb8b9e60 r6:85401900 r5:84a75400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85404a00 INFO: task kworker/0:345:5273 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c59be000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:346:5274 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:346 state:D stack:0 pid:5274 tgid:5274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb86dd84 r8:00000002 r7:60000113 r6:eb86dd8c r5:84a76000 r4:84a76000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a76000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb86de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e0b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a76000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85485b8c r4:85485800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85485b8c r4:85401980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a76000 r8:854019ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401980 r8:8027f5e8 r7:eb8b9e60 r6:85401a00 r5:84a76000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb86dfb0 to 0xeb86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85404a00 INFO: task kworker/0:346:5274 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c59be000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:347:5276 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:347 state:D stack:0 pid:5276 tgid:5276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8d9d84 r8:00000002 r7:60000113 r6:eb8d9d8c r5:84a76c00 r4:84a76c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a76c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550fec0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548638c r4:85486000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548638c r4:85401a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a76c00 r8:85401aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401a80 r8:8027f5e8 r7:eb86de60 r6:85401b00 r5:84a76c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d9fb0 to 0xeb8d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851e0800 INFO: task kworker/0:347:5276 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c62da000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:348:5277 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:348 state:D stack:0 pid:5277 tgid:5277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8e5d84 r8:00000002 r7:60000013 r6:eb8e5d8c r5:855b3000 r4:855b3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f6f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b3000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85485f8c r4:85485c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85485f8c r4:85401b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3000 r8:85401bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401b80 r8:8027f5e8 r7:eb8d9e60 r6:851d1180 r5:855b3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e5fb0 to 0xeb8e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f6c00 INFO: task kworker/0:348:5277 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c62da000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:349:5280 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:349 state:D stack:0 pid:5280 tgid:5280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8f1d84 r8:00000002 r7:60000013 r6:eb8f1d8c r5:855b3c00 r4:855b3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516e800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa71000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548838c r4:85488000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548838c r4:85401c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b3c00 r8:85401c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401c00 r8:8027f5e8 r7:eb8d9e60 r6:851d1200 r5:855b3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f1fb0 to 0xeb8f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85404f40 INFO: task kworker/0:349:5280 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c62da000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:350:5281 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:5281 tgid:5281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8f5d84 r8:00000002 r7:60000113 r6:eb8f5d8c r5:855b4800 r4:855b4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8f5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516e0c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85486b8c r4:85486800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85486b8c r4:85401c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b4800 r8:85401cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401c80 r8:8027f5e8 r7:eb8f1e60 r6:851d1280 r5:855b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f5fb0 to 0xeb8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85404f40 INFO: task kworker/0:350:5281 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c6809000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:351:5284 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:351 state:D stack:0 pid:5284 tgid:5284 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8fdd84 r8:00000002 r7:60000113 r6:eb8fdd8c r5:855b5400 r4:855b5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516e180 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b5400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb671000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85486f8c r4:85486c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85486f8c r4:85401d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b5400 r8:85401d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401d00 r8:8027f5e8 r7:eb8f1e60 r6:851d1300 r5:855b5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8fdfb0 to 0xeb8fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8516e080 INFO: task kworker/0:351:5284 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c6cd3000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:352:5286 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:352 state:D stack:0 pid:5286 tgid:5286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb905d84 r8:00000002 r7:60000013 r6:eb905d8c r5:855b0c00 r4:855b0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb905e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516e2c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548738c r4:85487000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548738c r4:85401d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b0c00 r8:85401dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401d80 r8:8027f5e8 r7:eb8f1e60 r6:851d1380 r5:855b0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb905fb0 to 0xeb905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8516e1c0 INFO: task kworker/0:352:5286 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:727:5288 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:727 state:D stack:0 pid:5288 tgid:5288 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb909d84 r8:00000002 r7:60000013 r6:eb909d8c r5:855b6000 r4:855b6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb909e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849795c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 r5:00001000 r4:eacdf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855b6000 r8:851d142c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r4:e0631dc0 r5:00001000 r4:e01cf000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855b6c00 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb69b000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85401e00 r8:8027f5e8 r7:eb8f1e60 r6:851d1500 r5:855b6c00 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:728:5292 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:728 state:D stack:0 pid:5292 tgid:5292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb915d84 r8:00000002 r7:60000113 r6:eb915d8c r5:85506000 r4:85506000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85506000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb915e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84979000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85506000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854ce38c r4:854ce000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854ce38c r4:851d1580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85506000 r8:851d15ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851d1580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1580 r8:8027f5e8 r7:eb909e60 r6:851d1600 r5:85506000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb915fb0 to 0xeb915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85168580 INFO: task kworker/1:728:5292 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c7fff000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:855b8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb91de08 r5:00001000 r4:eb6ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85487b8c r4:85487800 r10:61c88647 r9:855b8c00 r8:85401eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8516e640 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c7fff000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:5295 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:355 state:D stack:0 pid:5295 tgid:5295 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb921d84 r8:00000002 r7:60000113 r6:eb921d8c r5:855b9800 r4:855b9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb921e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516e740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855b9800 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb701000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855b9800 r8:85401f2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r4:e0631dc0 r5:00001000 r4:e01cf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:356:5298 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:5298 tgid:5298 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb929d84 r8:00000002 r7:60000013 r6:eb929d8c r5:855ba400 r4:855ba400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ba400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516e940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548878c r4:85488400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548878c r4:85401f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ba400 r8:85401fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85401f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85401f80 r8:8027f5e8 r7:eb8f1e60 r6:851d1780 r5:855ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb929fb0 to 0xeb929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8516e680 INFO: task kworker/0:356:5298 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c8773000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:855bb000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84979a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf61000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cf38c r4:854cf000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854cf38c r4:851d1800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bb000 r8:851d182c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851d1800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1800 r8:8027f5e8 r7:eb909e60 r6:851d1880 r5:855bb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d9fb0 to 0xeb7d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) r5:80070013 r4:80239bb0 r4:e0631dc0 r5:00001000 r4:e01cf000 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 Workqueue: events bpf_prog_free_deferred r5:855bbc00 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eae37000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:854ceb8c r4:851d1900 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84979700 INFO: task kworker/1:730:5305 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c8773000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:731:5306 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:731 state:D stack:0 pid:5306 tgid:5306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb8e1d84 r8:00000002 r7:60000113 r6:eb8e1d8c r5:855bc800 r4:855bc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855bc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84979840 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf29000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cef8c r4:854cec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854cef8c r4:851d1a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bc800 r8:851d1a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xeb8e1fb0 to 0xeb8e1ff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r4:e0631dc0 r5:00001000 r4:e01cf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r4:84be4100 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb81b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548978c r4:85489400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548978c r4:853f3000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855bd400 r8:853f302c r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3000 r8:8027f5e8 r7:eb929e60 r6:851d1b00 r5:855bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7f9fb0 to 0xeb7f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8516ea80 INFO: task kworker/0:357:5309 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c92d9000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:732:5310 blocked for more than 473 seconds. Workqueue: events bpf_prog_free_deferred r5:855be000 r4:829188d8 r4:00000000 r4:00000000 r5:00001000 r4:eb0cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854cf78c r4:854cf400 r10:61c88647 r9:855be000 r8:851d1bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84979a00 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/0:358 state:D stack:0 pid:5311 tgid:5311 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r5:00001000 r4:eb621000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85488b8c r4:85488800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c92d9000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:733:5313 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:733 state:D stack:0 pid:5313 tgid:5313 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb811d84 r8:00000002 r7:60000013 r6:eb811d8c r5:855b8000 r4:855b8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855b8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb811e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84979e80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4f7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:854cfb8c r4:854cf800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:854cfb8c r4:851d1d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855b8000 r8:851d1d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851d1d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851d1d00 r8:8027f5e8 r7:eb849e60 r6:851d1d80 r5:855b8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb811fb0 to 0xeb811ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r5:80070013 r4:80239bb0 r4:e0631dc0 r5:00001000 r4:e01cf000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:734 state:D stack:0 pid:5316 tgid:5316 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb935e08 r5:00001000 r4:eb51f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:854cff8c r4:854cfc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c9845000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:735:5317 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:735 state:D stack:0 pid:5317 tgid:5317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb931d84 r8:00000002 r7:60000113 r6:eb931d8c r5:855c0000 r4:855c0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb931e08 r4:00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb533000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8555038c r4:85550000 r10:61c88647 r9:855c0000 r8:851d1f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: c9845000 e01a1000 00000001 80239b98 7f63f000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r5:8436478c r4:84364400 r4:8494cf80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:736 state:D stack:0 pid:5320 tgid:5320 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08 r5:00001000 r4:eb545000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8555078c r4:851c7000 Exception stack(0xeb93dfb0 to 0xeb93dff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: c9cf4000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:737:5321 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:737 state:D stack:0 pid:5321 tgid:5321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb941d84 r8:00000002 r7:60000113 r6:eb941d8c r5:84a74800 r4:84a74800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a74800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb941e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a74800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb555000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85550b8c r4:85550800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85550b8c r4:851c7100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84a74800 r8:851c712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c7100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7100 r8:8027f5e8 r7:eb93de60 r6:853f3100 r5:84a74800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb941fb0 to 0xeb941ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:85168580 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r4:e0631dc0 r5:00001000 r4:e01cf000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:738 state:D stack:0 pid:5324 tgid:5324 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb94de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a3000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:851c7180 r8:8027f5e8 r7:eb941e60 r6:853f3180 r5:849b5400 r4:851b7280 Call trace: 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:739:5325 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:739 state:D stack:0 pid:5325 tgid:5325 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb951d84 r8:00000002 r7:60000113 r6:eb951d8c r5:849b6000 r4:849b6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849b6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb951e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555138c r4:85551000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555138c r4:851c7200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849b6000 r8:851c722c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c7200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7200 r8:8027f5e8 r7:eb94de60 r6:853f3200 r5:849b6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb951fb0 to 0xeb951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b7280 INFO: task kworker/1:739:5325 is blocked on a mutex likely owned by task kworker/1:288:3824. Exception stack(0xe0631d28 to 0xe0631d70) r4:00000000 r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:740:5327 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:740 state:D stack:0 pid:5327 tgid:5327 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb955d84 r8:00000002 r7:60000013 r6:eb955d8c r5:84a73c00 r4:84a73c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84a73c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb5ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a73c00 r8:851c72ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb60b000 r4:851c7300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7300 r8:8027f5e8 r7:eb955e60 r6:853f3300 r5:85580000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb959fb0 to 0xeb959ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b73c0 INFO: task kworker/1:741:5329 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: cacec000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:e0631dc0 r5:8436478c r4:84364400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb939e08 r5:00001000 r4:eb711000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000000 r4:e0631dc0 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7740 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85551f8c r4:85551c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85551f8c r4:851c7400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85581800 r8:851c742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c7400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7400 r8:8027f5e8 r7:eb939e60 r6:853f3400 r5:85581800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb95dfb0 to 0xeb95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b7600 INFO: task kworker/1:743:5334 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: cb050000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000001 INFO: task kworker/0:359:5336 blocked for more than 473 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb949e08 r5:00001000 r4:eb659000 r4:853f3480 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:00000000 r5:00001000 r4:eb813000 r7:dddced80 r6:83018000 r5:8548938c r4:853f3580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85583000 r8:853f35ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3580 r8:8027f5e8 r7:eb7f9e60 r6:853f3600 r5:85583000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb961fb0 to 0xeb961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8540c5c0 INFO: task kworker/0:360:5337 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: cb549000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:744:5339 blocked for more than 473 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:744 state:D stack:0 pid:5339 tgid:5339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb965d84 r8:00000002 r7:60000013 r6:eb965d8c r5:85583c00 r4:85583c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85583c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb965e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7b00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb729000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: cba8f000 e01a1000 00000001 80239b98 7f63f000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:745 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb969d84 r8:00000002 r7:60000113 r6:eb969d8c r5:85584800 r4:85584800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85584800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb969e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851b7a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85584800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555278c r4:85552400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555278c r4:851c7500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85584800 r8:851c752c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c7500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7500 r8:8027f5e8 r7:eb965e60 r6:853f3700 r5:85584800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb74b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85552f8c r4:851c7580 Exception stack(0xeb96dfb0 to 0xeb96dff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:e0631dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 task:kworker/1:747 state:D stack:0 pid:5345 tgid:5345 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08 r5:00001000 r4:eb769000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8555338c r4:851c7600 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85586000 r8:851c762c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c7600 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7600 r8:8027f5e8 r7:eb96de60 r6:853f3800 r5:85586000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb971fb0 to 0xeb971ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b73c0 INFO: task kworker/1:747:5345 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: cc18d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:748:5347 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:748 state:D stack:0 pid:5347 tgid:5347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb975d84 r8:00000002 r7:60000013 r6:eb975d8c r5:85586c00 r4:85586c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85586c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb7a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85553b8c r4:85553800 r4:851c7680 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0631dc0 r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:749:5349 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:749 state:D stack:0 pid:5349 tgid:5349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb979d84 r8:00000002 r7:60000013 r6:eb979d8c r5:855c2400 r4:855c2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb979e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8516e840 r4:00000000 r5:00001000 r4:eb787000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8555378c r4:85553400 r10:61c88647 r9:855c2400 r8:851c772c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b7e00 Call trace: 1d20: cc440000 e01a1000 00000001 80239b98 7f63f000 00000001 r4:e0631dc0 r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:750:5351 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:750 state:D stack:0 pid:5351 tgid:5351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb97dd84 r8:00000002 r7:60000113 r6:eb97dd8c r5:855c3c00 r4:855c3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb97de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb7e5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85553f8c r4:85553c00 r10:61c88647 r9:855c3c00 r8:851c782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b7e00 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be4100 task:kworker/1:751 state:D stack:0 pid:5353 tgid:5353 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f0740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb82d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555478c r4:85554400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555478c r4:851c7900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c5400 r8:851c792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c7900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7900 r8:8027f5e8 r7:eb97de60 r6:851c7980 r5:855c5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb981fb0 to 0xeb981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f02c0 INFO: task kworker/1:751:5353 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:752 state:D stack:0 pid:5354 tgid:5354 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb985d84 r8:00000002 r7:60000013 r6:eb985d8c r5:855c6000 r4:855c6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb985e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f0240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eb7fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8555438c r4:85554000 r10:61c88647 r9:855c6000 r8:851c7a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:e0631dc0 r5:00001000 r4:e01cf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:855c6c00 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eba07000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855c6c00 r8:853f392c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8540cd80 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb84b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85554f8c r4:85554c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85554f8c r4:851c7b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c3000 r8:851c7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c7b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7b80 r8:8027f5e8 r7:eb981e60 r6:851c7c00 r5:855c3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb995fb0 to 0xeb995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853f0580 INFO: task kworker/1:753:5360 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ccf7c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:362:5362 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:362 state:D stack:0 pid:5362 tgid:5362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb999d84 r8:00000002 r7:60000113 r6:eb999d8c r5:854f4800 r4:854f4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:854f4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb999e08 r4:00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb9f5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:dddced80 r6:83018000 r5:85489b8c r4:853f3980 Exception stack(0xeb999fb0 to 0xeb999ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8540cd80 INFO: task kworker/0:362:5362 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: cd638000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:754:5363 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:754 state:D stack:0 pid:5363 tgid:5363 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb839000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85554b8c r4:851c7d00 Exception stack(0xeb99dfb0 to 0xeb99dff8) r4:853f0a00 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r5:80070013 r4:80239bb0 r4:e0631dc0 r5:00001000 r4:e01cf000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:755 state:D stack:0 pid:5367 tgid:5367 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 r4:00000000 r5:00001000 r4:eb857000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8555538c r4:851c7e00 Exception stack(0xeb98dfb0 to 0xeb98dff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: cdaa6000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:756:5368 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:756 state:D stack:0 pid:5368 tgid:5368 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb945d84 r8:00000002 r7:60000113 r6:eb945d8c r5:855c9800 r4:855c9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb945e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f0dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb99f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555578c r4:85555400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555578c r4:851c7f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c9800 r8:851c7f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851c7f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851c7f00 r8:8027f5e8 r7:eb98de60 r6:851c7f80 r5:855c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb945fb0 to 0xeb945ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:84be4100 task:kworker/1:757 state:D stack:0 pid:5369 tgid:5369 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb9a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85555b8c r4:851b8000 Exception stack(0xeb989fb0 to 0xeb989ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d8000 INFO: task kworker/1:757:5369 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: cdd65000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:758:5371 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:758 state:D stack:0 pid:5371 tgid:5371 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb9b3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:855cbc00 r8:851b812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:855cd400 r4:829188d8 r4:00000000 r4:00000000 r5:00001000 r4:eb9c7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8555678c r4:85556400 r10:61c88647 r9:855cd400 r8:851b822c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d20: cde6c000 e01a1000 00000001 80239b98 7f63f000 00000001 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:760:5375 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:760 state:D stack:0 pid:5375 tgid:5375 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:855ce000 r4:855ce000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ce000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d8540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9b9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8555638c r4:85556000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8555638c r4:851b8300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ce000 r8:851b832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r4:00000000 r5:8436478c r4:84364400 r4:8494cf80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:761 state:D stack:0 pid:5377 tgid:5377 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:855cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 r5:00001000 r4:eb9cd000 r7:ddde2d80 r6:83018200 r5:85556b8c r4:851b8400 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 Exception stack(0xe0631d28 to 0xe0631d70) 1d20: ce1c9000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:762:5379 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:762 state:D stack:0 pid:5379 tgid:5379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb9d9d84 r8:00000002 r7:60000013 r6:eb9d9d8c r5:855c0c00 r4:855c0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855c0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9d9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d8b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85556f8c r4:85556c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85556f8c r4:851b8500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855c0c00 r8:851b852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b8500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8500 r8:8027f5e8 r7:eb9d1e60 r6:851b8580 r5:855c0c00 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e1000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:e0631dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:764:5383 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:764 state:D stack:0 pid:5383 tgid:5383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb9edd84 r8:00000002 r7:60000113 r6:eb9edd8c r5:855d0000 r4:855d0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9ede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85409540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855d0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85557f8c r4:85557c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85557f8c r4:851b8700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d0000 r8:851b872c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b8700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8700 r8:8027f5e8 r7:eb9e5e60 r6:851b8780 r5:855d0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9edfb0 to 0xeb9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d8d80 INFO: task kworker/1:764:5383 is blocked on a mutex likely owned by task kworker/1:288:3824. Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80070013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r5:8436478c r4:84364400 r4:8494cf80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eb9a9d84 r8:00000002 r7:60000013 r6:eb9a9d8c r5:855d0c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a9e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ef000 r5:8555778c r4:85557400 r10:61c88647 r9:855d0c00 r8:851b882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r5:8436478c r4:84364400 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:855d3000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba05e08 r5:00001000 r4:eba0d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85557b8c r4:85557800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85557b8c r4:851b8900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d3000 r8:851b892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b8900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8900 r8:8027f5e8 r7:eb9ede60 r6:851b8980 r5:855d3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba05fb0 to 0xeba05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851b73c0 INFO: task kworker/1:766:5387 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: cf3ff000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:363:5389 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:363 state:D stack:0 pid:5389 tgid:5389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba15d84 r8:00000002 r7:60000113 r6:eba15d8c r5:855d1800 r4:855d1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba15e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb23d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:364:5390 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:364 state:D stack:0 pid:5390 tgid:5390 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba1dd84 r8:00000002 r7:60000113 r6:eba1dd8c r5:855d2400 r4:855d2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba1de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d8f40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855d2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548a78c r4:8548a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548a78c r4:853f3a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d2400 r8:853f3aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:853f3a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853f3a80 r8:8027f5e8 r7:eba15e60 r6:851b8a80 r5:855d2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba1dfb0 to 0xeba1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:853fa100 INFO: task kworker/0:364:5390 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:767:5393 blocked for more than 474 seconds. r4:855d3c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba11e08 r5:00001000 r4:eba2b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:768:5395 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:768 state:D stack:0 pid:5395 tgid:5395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb9f9d84 r8:00000002 r7:60000113 r6:eb9f9d8c r5:855d5400 r4:855d5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85409640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba25000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556438c r4:85564000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556438c r4:851b8c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d5400 r8:851b8c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b8c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8c00 r8:8027f5e8 r7:eba11e60 r6:851b8c80 r5:855d5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f9fb0 to 0xeb9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854095c0 INFO: task kworker/1:768:5395 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: cfc2c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r5:00001000 r4:e01cf000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:769:5397 blocked for more than 474 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba01d84 r8:00000002 r7:60000113 r6:eba01d8c r5:855d6000 r4:855d6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba01e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854098c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba31000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85564b8c r4:85564800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85564b8c r4:851b8d00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855d6000 r8:851b8d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:851b8d00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851b8d00 r8:8027f5e8 r7:eba11e60 r6:851b8d80 r5:855d6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba01fb0 to 0xeba01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854097c0 INFO: task kworker/1:769:5397 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: cff90000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:855d6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 r5:00001000 r4:eba3f000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:771 state:D stack:0 pid:5401 tgid:5401 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba3de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba45000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:772:5403 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:772 state:D stack:0 pid:5403 tgid:5403 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba49d84 r8:00000002 r7:60000113 r6:eba49d8c r5:855cb000 r4:855cb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855cb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba49e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85409d40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba53000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556578c r4:85565400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556578c r4:8540a000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855cb000 r8:8540a02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540a000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540a000 r8:8027f5e8 r7:eba3de60 r6:8540a080 r5:855cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba49fb0 to 0xeba49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85409c40 INFO: task kworker/1:772:5403 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80070013 r4:80239bb0 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eba51d84 r8:00000002 r7:60000113 r6:eba51d8c r5:855c4800 r4:00000000 r4:00000000 r5:00001000 r4:eba6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:774:5406 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:774 state:D stack:0 pid:5406 tgid:5406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba65d84 r8:00000002 r7:60000113 r6:eba65d8c r5:84870000 r4:84870000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84870000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cf040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84870000 r7:00000000 r6:83018200 r5:00001000 r4:7f0db000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba59000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85565b8c r4:85565800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85565b8c r4:8540a200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84870000 r8:8540a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540a200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540a200 r8:8027f5e8 r7:eba51e60 r6:853f3b00 r5:84870000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba65fb0 to 0xeba65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) Not tainted 6.15.0-syzkaller #0 r4:84870c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba75e08 r5:00001000 r4:eba71000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r5:80070013 r4:80239bb0 r4:e0631dc0 r5:00001000 r4:e01cf000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cf440 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84874800 r7:00000000 r6:83018200 r5:00001000 r4:7f0e1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba7f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556678c r4:85566400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556678c r4:8540a300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84874800 r8:8540a32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540a300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540a300 r8:8027f5e8 r7:eba75e60 r6:853f3c00 r5:84874800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba91fb0 to 0xeba91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cf6c0 INFO: task kworker/1:776:5413 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d0c7e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:8494cf80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba85000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r4:00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0631dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eb875d84 r8:00000002 r7:60000013 r6:eb875d8c r5:84873000 r4:84873000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84873000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb875e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cf740 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84873000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfabb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85566f8c r4:85566c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85566f8c r4:8540a400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84873000 r8:8540a42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540a400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540a400 r8:8027f5e8 r7:eb85de60 r6:853f3d00 r5:84873000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb875fb0 to 0xeb875ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cf6c0 INFO: task kworker/1:778:5415 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d0c7e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:779 state:D stack:0 pid:5417 tgid:5417 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e49cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84876000 r8:8540a4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r4:00000000 r5:00001000 r4:e01cf000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Call trace: [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cf940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84876c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac2d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556778c r4:85567400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556778c r4:8540a500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84876c00 r8:8540a52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540a500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540a500 r8:8027f5e8 r7:eb8c5e60 r6:853f3e00 r5:84876c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e9fb0 to 0xeb8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cf840 INFO: task kworker/1:780:5419 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d1f74000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:781:5421 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:781 state:D stack:0 pid:5421 tgid:5421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba95d84 r8:00000002 r7:60000113 r6:eba95d8c r5:84873c00 r4:84873c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84873c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba95e08 r4:00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb055000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85567b8c r4:8540a580 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0631d28 to 0xe0631d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:eba99d84 r8:00000002 r7:60000013 r6:eba99d8c r5:84872400 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb39d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8556938c r4:8540a600 Exception stack(0xeba99fb0 to 0xeba99ff8) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:783:5425 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:783 state:D stack:0 pid:5425 tgid:5425 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba9dd84 r8:00000002 r7:60000113 r6:eba9dd8c r5:84871800 r4:84871800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84871800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba9de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851cfbc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84871800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85567f8c r4:85567c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85567f8c r4:8540a680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84871800 r8:8540a6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540a680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540a680 r8:8027f5e8 r7:eba99e60 r6:853f3f80 r5:84871800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba9dfb0 to 0xeba9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cfc00 INFO: task kworker/1:783:5425 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d241e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1a3000 r5:8556838c r4:85568000 r4:8540a700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540a700 r8:8027f5e8 r7:eba99e60 r6:851dc000 r5:849c8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa1fb0 to 0xebaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851cfec0 INFO: task kworker/1:784:5426 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d27ac000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:849c8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa5e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb26b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0631fb0 to 0xe0631ff8) Not tainted 6.15.0-syzkaller #0 r4:849c9800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba5de08 r5:00001000 r4:eafd1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84a3138c r4:851dc100 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:5433 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:366 state:D stack:0 pid:5433 tgid:5433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba69d84 r8:00000002 r7:60000113 r6:eba69d8c r5:849ca400 r4:849ca400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849ca400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba69e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851ce000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8548af8c r4:8548ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548af8c r4:851dc200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849ca400 r8:851dc22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dc200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dc200 r8:8027f5e8 r7:eba5de60 r6:851dc280 r5:849ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba69fb0 to 0xeba69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8540ce40 INFO: task kworker/0:366:5433 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d2c6e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:786 state:D stack:0 pid:5435 tgid:5435 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa9e08 r5:00001000 r4:eb325000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebab1d84 r8:00000002 r7:60000113 r6:ebab1d8c r5:855da400 r4:00000000 r9:83018205 r8:855da400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 r5:00001000 r4:eb363000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85568f8c r4:85568c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85568f8c r4:8540a900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855da400 r8:8540a92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540a900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540a900 r8:8027f5e8 r7:eba99e60 r6:8540aa00 r5:855da400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab1fb0 to 0xebab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851db000 INFO: task kworker/1:787:5439 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d3089000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:788:5441 blocked for more than 474 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:788 state:D stack:0 pid:5441 tgid:5441 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebaadd84 r8:00000002 r7:60000113 r6:ebaadd8c r5:855db000 r4:855db000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855db000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851db580 r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb453000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:851db280 Workqueue: events bpf_prog_free_deferred 1d20: d34b7000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r4:855dbc00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba89e08 r5:00001000 r4:eb3cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0631fb0 to 0xe0631ff8) Not tainted 6.15.0-syzkaller #0 r4:855dc800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab9e08 r5:00001000 r4:eb497000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8540ac00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540ac00 r8:8027f5e8 r7:ebaade60 r6:8540ac80 r5:855dc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebab9fb0 to 0xebab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851db700 INFO: task kworker/1:790:5444 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d3bba000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:367:5448 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:367 state:D stack:0 pid:5448 tgid:5448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebab5d84 r8:00000002 r7:60000113 r6:ebab5d8c r5:855dd400 r4:855dd400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855dd400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebab5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:00001000 r4:eba17000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:851dc300 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0631d28 to 0xe0631d70) r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:791:5449 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:791 state:D stack:0 pid:5449 tgid:5449 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebabdd84 r8:00000002 r7:60000113 r6:ebabdd8c r5:855de000 r4:855de000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855de000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855de000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb681000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556b38c r4:8556b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556b38c r4:8540ad80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855de000 r8:8540adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8540ad80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8540ad80 r8:8027f5e8 r7:ebab9e60 r6:8540ae00 r5:855de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebabdfb0 to 0xebabdff8) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0631d28 to 0xe0631d70) 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4b7000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb4db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8556a78c r4:8540af80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d20: d414f000 e01a1000 00000001 80239b98 7f63f000 00000001 r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:794:5453 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:794 state:D stack:0 pid:5453 tgid:5453 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebacdd84 r8:00000002 r7:60000113 r6:ebacdd8c r5:855d8000 r4:855d8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855d8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dbd80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8556ab8c r4:8556a800 r10:61c88647 r9:855d8000 r8:848d70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r5:8436478c r4:84364400 r4:8494cf80 Exception stack(0xe0631fb0 to 0xe0631ff8) Not tainted 6.15.0-syzkaller #0 r4:855e0000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r5:00001000 r4:eb66f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:796:5458 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:796 state:D stack:0 pid:5458 tgid:5458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebad1d84 r8:00000002 r7:60000113 r6:ebad1d8c r5:855e0c00 r4:855e0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb691000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556b78c r4:8556b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556b78c r4:848d7280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e0c00 r8:848d72ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7280 r8:8027f5e8 r7:ebabde60 r6:848d7300 r5:855e0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad1fb0 to 0xebad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851df000 INFO: task kworker/1:796:5458 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d4bde000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:797:5460 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:797 state:D stack:0 pid:5460 tgid:5460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebad9d84 r8:00000002 r7:60000113 r6:ebad9d8c r5:855e1800 r4:855e1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb88b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562478c r4:85624400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562478c r4:848d7380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e1800 r8:848d73ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7380 r8:8027f5e8 r7:ebad1e60 r6:848d7400 r5:855e1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad9fb0 to 0xebad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851df100 INFO: task kworker/1:797:5460 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d4bde000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:798:5461 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:798 state:D stack:0 pid:5461 tgid:5461 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebad5d84 r8:00000002 r7:60000113 r6:ebad5d8c r5:855e2400 r4:855e2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556bb8c r4:8556b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556bb8c r4:848d7480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e2400 r8:848d74ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7480 r8:8027f5e8 r7:ebad9e60 r6:848d7500 r5:855e2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebad5fb0 to 0xebad5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851df100 INFO: task kworker/1:798:5461 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d50d4000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:799:5463 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:799 state:D stack:0 pid:5463 tgid:5463 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebaddd84 r8:00000002 r7:60000013 r6:ebaddd8c r5:855e3000 r4:855e3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebadde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e3000 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8556bf8c r4:8556bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8556bf8c r4:848d7580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e3000 r8:848d75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7580 r8:8027f5e8 r7:ebad9e60 r6:848d7600 r5:855e3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaddfb0 to 0xebaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851df480 INFO: task kworker/1:799:5463 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d50d4000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:800:5465 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:800 state:D stack:0 pid:5465 tgid:5465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebae1d84 r8:00000002 r7:60000113 r6:ebae1d8c r5:855e3c00 r4:855e3c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e3c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df6c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb859000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562438c r4:85624000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562438c r4:848d7680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e3c00 r8:848d76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7680 r8:8027f5e8 r7:ebad9e60 r6:848d7700 r5:855e3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae1fb0 to 0xebae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851df480 INFO: task kworker/1:800:5465 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d5688000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:801:5468 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:801 state:D stack:0 pid:5468 tgid:5468 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebae5d84 r8:00000002 r7:60000013 r6:ebae5d8c r5:855e4800 r4:855e4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851df900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e4800 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb899000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85624b8c r4:85624800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85624b8c r4:848d7780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e4800 r8:848d77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7780 r8:8027f5e8 r7:ebad9e60 r6:848d7800 r5:855e4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae5fb0 to 0xebae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851df7c0 INFO: task kworker/1:801:5468 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d5688000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:802:5470 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:802 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebaedd84 r8:00000002 r7:60000013 r6:ebaedd8c r5:855e5400 r4:855e5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaede08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dfd00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e5400 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562538c r4:85625000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562538c r4:848d7880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e5400 r8:848d78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7880 r8:8027f5e8 r7:ebae5e60 r6:848d7900 r5:855e5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaedfb0 to 0xebaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851df880 INFO: task kworker/1:802:5470 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d5949000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:803:5472 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:803 state:D stack:0 pid:5472 tgid:5472 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebaf1d84 r8:00000002 r7:60000113 r6:ebaf1d8c r5:855e6000 r4:855e6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dfa80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e6000 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8af000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85624f8c r4:85624c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85624f8c r4:848d7980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e6000 r8:848d79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7980 r8:8027f5e8 r7:ebaede60 r6:848d7a00 r5:855e6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf1fb0 to 0xebaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851df880 INFO: task kworker/1:803:5472 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d5949000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:804:5473 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:804 state:D stack:0 pid:5473 tgid:5473 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebae9d84 r8:00000002 r7:60000113 r6:ebae9d8c r5:855e6c00 r4:855e6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855e6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebae9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:855e6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85625b8c r4:85625800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85625b8c r4:848d7a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855e6c00 r8:848d7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7a80 r8:8027f5e8 r7:ebaede60 r6:848d7b00 r5:855e6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae9fb0 to 0xebae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851df880 INFO: task kworker/1:804:5473 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d5d3c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:805:5476 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:805 state:D stack:0 pid:5476 tgid:5476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebaf5d84 r8:00000002 r7:60000113 r6:ebaf5d8c r5:85628000 r4:85628000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85628000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dfd80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85628000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8eb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562578c r4:85625400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562578c r4:848d7b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85628000 r8:848d7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7b80 r8:8027f5e8 r7:ebae9e60 r6:848d7c00 r5:85628000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf5fb0 to 0xebaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851dff00 INFO: task kworker/1:805:5476 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d5d3c000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:806:5478 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:806 state:D stack:0 pid:5478 tgid:5478 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebafdd84 r8:00000002 r7:60000013 r6:ebafdd8c r5:85628c00 r4:85628c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85628c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebafde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85628c00 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb90f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85625f8c r4:85625c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85625f8c r4:848d7c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85628c00 r8:848d7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7c80 r8:8027f5e8 r7:ebae9e60 r6:848d7d00 r5:85628c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebafdfb0 to 0xebafdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8551c080 INFO: task kworker/1:806:5478 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d661e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:807:5480 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:807 state:D stack:0 pid:5480 tgid:5480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb01d84 r8:00000002 r7:60000113 r6:ebb01d8c r5:85629800 r4:85629800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85629800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb01e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c4c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85629800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e08ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562678c r4:85626400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562678c r4:848d7d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85629800 r8:848d7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7d80 r8:8027f5e8 r7:ebafde60 r6:848d7e00 r5:85629800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb01fb0 to 0xebb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8551c080 INFO: task kworker/1:807:5480 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d661e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:808:5481 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:808 state:D stack:0 pid:5481 tgid:5481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebaf9d84 r8:00000002 r7:60000113 r6:ebaf9d8c r5:8562a400 r4:8562a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562a400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa8d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562638c r4:85626000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562638c r4:848d7e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562a400 r8:848d7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7e80 r8:8027f5e8 r7:ebb01e60 r6:848d7f00 r5:8562a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf9fb0 to 0xebaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8551c2c0 INFO: task kworker/1:808:5481 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d6ab7000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:809:5484 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:809 state:D stack:0 pid:5484 tgid:5484 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba8dd84 r8:00000002 r7:60000013 r6:eba8dd8c r5:8562b000 r4:8562b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba8de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c980 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562b000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562738c r4:85627000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562738c r4:848d7f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562b000 r8:848d7fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:848d7f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848d7f80 r8:8027f5e8 r7:ebb01e60 r6:85526000 r5:8562b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba8dfb0 to 0xeba8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8551c440 INFO: task kworker/1:809:5484 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d6ab7000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:810:5486 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:810 state:D stack:0 pid:5486 tgid:5486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb09d84 r8:00000002 r7:60000013 r6:ebb09d8c r5:8562bc00 r4:8562bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead15000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85626b8c r4:85626800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85626b8c r4:85526080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562bc00 r8:855260ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526080 r8:8027f5e8 r7:eba8de60 r6:85526100 r5:8562bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb09fb0 to 0xebb09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8551c780 INFO: task kworker/1:810:5486 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d7053000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:811:5487 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:811 state:D stack:0 pid:5487 tgid:5487 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb05d84 r8:00000002 r7:60000113 r6:ebb05d8c r5:8562c800 r4:8562c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551c800 r9:83018205 r8:8562c800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae85000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85626f8c r4:85626c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85626f8c r4:85526180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562c800 r8:855261ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526180 r8:8027f5e8 r7:eba8de60 r6:85526200 r5:8562c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb05fb0 to 0xebb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8551c780 INFO: task kworker/1:811:5487 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d73d1000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:812:5490 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:812 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb0dd84 r8:00000002 r7:60000013 r6:ebb0dd8c r5:8562d400 r4:8562d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551ca40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562d400 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562778c r4:85627400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8562778c r4:85526280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562d400 r8:855262ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526280 r8:8027f5e8 r7:eba8de60 r6:85526300 r5:8562d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb0dfb0 to 0xebb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8551c8c0 INFO: task kworker/1:812:5490 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d73d1000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:813:5492 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:813 state:D stack:0 pid:5492 tgid:5492 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb15d84 r8:00000002 r7:60000113 r6:ebb15d8c r5:8562e000 r4:8562e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551cc40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562e000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb521000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85627b8c r4:85627800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85627b8c r4:85526380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562e000 r8:855263ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526380 r8:8027f5e8 r7:ebb0de60 r6:85526400 r5:8562e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb15fb0 to 0xebb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8551cc00 INFO: task kworker/1:813:5492 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d73d1000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:814:5494 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:814 state:D stack:0 pid:5494 tgid:5494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb19d84 r8:00000002 r7:60000113 r6:ebb19d8c r5:8562ec00 r4:8562ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8562ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8551ce00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8562ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb53d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85627f8c r4:85627c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85627f8c r4:85526480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8562ec00 r8:855264ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526480 r8:8027f5e8 r7:ebb15e60 r6:85526500 r5:8562ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb19fb0 to 0xebb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8551cb80 INFO: task kworker/1:814:5494 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d7b4d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:815:5496 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:815 state:D stack:0 pid:5496 tgid:5496 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb1dd84 r8:00000002 r7:60000113 r6:ebb1dd8c r5:85630000 r4:85630000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85630000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb1de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851dff40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85630000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb575000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566838c r4:85668000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566838c r4:85526580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85630000 r8:855265ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526580 r8:8027f5e8 r7:ebb19e60 r6:85526600 r5:85630000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb1dfb0 to 0xebb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851dff80 INFO: task kworker/1:815:5496 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d7b4d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:816:5497 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:816 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb21d84 r8:00000002 r7:60000013 r6:ebb21d8c r5:85630c00 r4:85630c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85630c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb21e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85532140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85630c00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85668b8c r4:85668800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85668b8c r4:85526680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85630c00 r8:855266ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526680 r8:8027f5e8 r7:ebb1de60 r6:85526700 r5:85630c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb21fb0 to 0xebb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8551cf00 INFO: task kworker/1:816:5497 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d7ffc000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:817:5500 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:817 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb25d84 r8:00000002 r7:60000013 r6:ebb25d8c r5:85631800 r4:85631800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85631800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb25e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85532000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85631800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566878c r4:85668400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566878c r4:85526780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85631800 r8:855267ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526780 r8:8027f5e8 r7:ebb21e60 r6:85526800 r5:85631800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb25fb0 to 0xebb25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85532280 INFO: task kworker/1:817:5500 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d7ffc000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:818:5502 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:818 state:D stack:0 pid:5502 tgid:5502 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb29d84 r8:00000002 r7:60000113 r6:ebb29d8c r5:85632400 r4:85632400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85632400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85532300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85632400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb617000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85668f8c r4:85668c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85668f8c r4:85526880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85632400 r8:855268ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526880 r8:8027f5e8 r7:ebb21e60 r6:85526900 r5:85632400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb29fb0 to 0xebb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85532100 INFO: task kworker/1:818:5502 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d8608000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:819:5504 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:819 state:D stack:0 pid:5504 tgid:5504 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb11d84 r8:00000002 r7:60000113 r6:ebb11d8c r5:85633000 r4:85633000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85633000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855324c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85633000 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb653000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566938c r4:85669000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566938c r4:85526980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85633000 r8:855269ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526980 r8:8027f5e8 r7:ebb29e60 r6:85526a00 r5:85633000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb11fb0 to 0xebb11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85532100 INFO: task kworker/1:819:5504 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d8608000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:820:5507 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:820 state:D stack:0 pid:5507 tgid:5507 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb2dd84 r8:00000002 r7:60000013 r6:ebb2dd8c r5:85633c00 r4:85633c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85633c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb2de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85532900 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85633c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb731000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85669f8c r4:85669c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85669f8c r4:85526a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85633c00 r8:85526aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526a80 r8:8027f5e8 r7:ebb11e60 r6:85526b00 r5:85633c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb2dfb0 to 0xebb2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85532480 INFO: task kworker/1:820:5507 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d8904000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:821:5508 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:821 state:D stack:0 pid:5508 tgid:5508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb35d84 r8:00000002 r7:60000013 r6:ebb35d8c r5:85634800 r4:85634800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85634800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb35e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85532580 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85634800 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb70f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566978c r4:85669400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566978c r4:85526b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85634800 r8:85526bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526b80 r8:8027f5e8 r7:ebb2de60 r6:85526c00 r5:85634800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb35fb0 to 0xebb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855325c0 INFO: task kworker/1:821:5508 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d8904000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:822:5510 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:822 state:D stack:0 pid:5510 tgid:5510 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb39d84 r8:00000002 r7:60000013 r6:ebb39d8c r5:85635400 r4:85635400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85635400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85532800 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85635400 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb721000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85669b8c r4:85669800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85669b8c r4:85526c80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85635400 r8:85526cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526c80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526c80 r8:8027f5e8 r7:ebb2de60 r6:85526d00 r5:85635400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb39fb0 to 0xebb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855327c0 INFO: task kworker/1:822:5510 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d8f1a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:823:5512 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:823 state:D stack:0 pid:5512 tgid:5512 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb3dd84 r8:00000002 r7:60000113 r6:ebb3dd8c r5:85636000 r4:85636000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85636000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb3de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85532d00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85636000 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566a78c r4:8566a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566a78c r4:85526d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85636000 r8:85526dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526d80 r8:8027f5e8 r7:ebb2de60 r6:85526e00 r5:85636000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb3dfb0 to 0xebb3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85532880 INFO: task kworker/1:823:5512 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d8f1a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:824:5513 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:824 state:D stack:0 pid:5513 tgid:5513 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb31d84 r8:00000002 r7:60000013 r6:ebb31d8c r5:85636c00 r4:85636c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85636c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb31e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85532c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85636c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb77d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566a38c r4:8566a000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566a38c r4:85526e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85636c00 r8:85526eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526e80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526e80 r8:8027f5e8 r7:ebb3de60 r6:85526f00 r5:85636c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb31fb0 to 0xebb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85532880 INFO: task kworker/1:824:5513 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d8f1a000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:825:5517 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:825 state:D stack:0 pid:5517 tgid:5517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb49d84 r8:00000002 r7:60000113 r6:ebb49d8c r5:85639800 r4:85639800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85639800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb49e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d7040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85639800 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7fb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566ab8c r4:8566a800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566ab8c r4:85526f80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85639800 r8:85526fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85526f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85526f80 r8:8027f5e8 r7:ebb3de60 r6:8487c000 r5:85639800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb49fb0 to 0xebb49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85532b00 INFO: task kworker/1:825:5517 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d97c0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:826:5518 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:826 state:D stack:0 pid:5518 tgid:5518 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb4dd84 r8:00000002 r7:60000013 r6:ebb4dd8c r5:8563a400 r4:8563a400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563a400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb4de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d7480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8563a400 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb841000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566b78c r4:8566b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566b78c r4:8487c080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563a400 r8:8487c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8487c080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487c080 r8:8027f5e8 r7:ebb49e60 r6:8487c100 r5:8563a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb4dfb0 to 0xebb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85532b00 INFO: task kworker/1:826:5518 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d97c0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:827:5520 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:827 state:D stack:0 pid:5520 tgid:5520 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb45d84 r8:00000002 r7:60000113 r6:ebb45d8c r5:85638c00 r4:85638c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85638c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb45e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d71c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85638c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb815000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566af8c r4:8566ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566af8c r4:8487c180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85638c00 r8:8487c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8487c180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487c180 r8:8027f5e8 r7:ebb4de60 r6:8487c200 r5:85638c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb45fb0 to 0xebb45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d70c0 INFO: task kworker/1:827:5520 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d97c0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:828:5522 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:828 state:D stack:0 pid:5522 tgid:5522 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb41d84 r8:00000002 r7:60000113 r6:ebb41d8c r5:8563b000 r4:8563b000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563b000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb41e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d7380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8563b000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb825000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566b38c r4:8566b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566b38c r4:8487c280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563b000 r8:8487c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8487c280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487c280 r8:8027f5e8 r7:ebb4de60 r6:8487c300 r5:8563b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb41fb0 to 0xebb41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d7240 INFO: task kworker/1:828:5522 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: d97c0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:829:5525 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:829 state:D stack:0 pid:5525 tgid:5525 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:8563bc00 r4:8563bc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563bc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb51e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d7600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8563bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb855000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566bb8c r4:8566b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566bb8c r4:8487c380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563bc00 r8:8487c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8487c380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487c380 r8:8027f5e8 r7:ebb4de60 r6:8487c400 r5:8563bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb51fb0 to 0xebb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d7400 INFO: task kworker/1:829:5525 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: da045000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:830:5527 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:830 state:D stack:0 pid:5527 tgid:5527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb59d84 r8:00000002 r7:60000113 r6:ebb59d8c r5:8563c800 r4:8563c800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563c800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d7ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8563c800 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9a3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567478c r4:85674400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8567478c r4:8487c480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563c800 r8:8487c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8487c480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487c480 r8:8027f5e8 r7:ebb51e60 r6:8487c500 r5:8563c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb59fb0 to 0xebb59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d7540 INFO: task kworker/1:830:5527 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: da045000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:831:5528 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:831 state:D stack:0 pid:5528 tgid:5528 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb55d84 r8:00000002 r7:60000013 r6:ebb55d8c r5:8563d400 r4:8563d400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563d400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb55e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d7780 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8563d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8db000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8566bf8c r4:8566bc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8566bf8c r4:8487c580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563d400 r8:8487c5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8487c580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487c580 r8:8027f5e8 r7:ebb59e60 r6:8487c600 r5:8563d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb55fb0 to 0xebb55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d7540 INFO: task kworker/1:831:5528 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: da4cd000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:832:5531 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:832 state:D stack:0 pid:5531 tgid:5531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb5dd84 r8:00000002 r7:60000113 r6:ebb5dd8c r5:8563e000 r4:8563e000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8563e000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb5de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851d7540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8563e000 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb923000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567438c r4:85674000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8567438c r4:8487c680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8563e000 r8:8487c6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8487c680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487c680 r8:8027f5e8 r7:ebb59e60 r6:8487c700 r5:8563e000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb5dfb0 to 0xebb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d78c0 INFO: task kworker/1:832:5531 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: da4cd000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) INFO: task kworker/1:833:5532 blocked for more than 475 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb61e08 r5:00001000 r4:eb9b5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85674b8c r4:8487c780 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d20: da7f6000 e01a1000 00000001 80239b98 7f63f000 00000001 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:eb9c1000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:851d7bc0 INFO: task kworker/1:834:5535 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dac8e000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:835:5537 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:835 state:D stack:0 pid:5537 tgid:5537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb6dd84 r8:00000002 r7:60000113 r6:ebb6dd8c r5:85640000 r4:85640000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85640000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eba23000 r10:61c88647 r9:85640000 r8:8487c9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:836:5538 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:836 state:D stack:0 pid:5538 tgid:5538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb71d84 r8:00000002 r7:60000113 r6:ebb71d8c r5:85640c00 r4:85640c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85640c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb71e08 r9:83018205 r8:85640c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 r5:00001000 r4:eb9d3000 r4:00000001 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8435b040 r5:00001000 r4:eb9df000 r7:ddde2d80 r6:83018200 r5:8567578c r4:8487cb80 r4:8435b080 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:838:5544 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:838 state:D stack:0 pid:5544 tgid:5544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb79d84 r8:00000002 r7:60000113 r6:ebb79d8c r5:85642400 r4:85642400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85642400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb9f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:8487cc80 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Not tainted 6.15.0-syzkaller #0 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8435b280 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85643000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9fd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85675f8c r4:85675c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85675f8c r4:8487cd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85643000 r8:8487cdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8487cd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487cd80 r8:8027f5e8 r7:ebb6de60 r6:8487ce00 r5:85643000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb7dfb0 to 0xebb7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8435b180 INFO: task kworker/1:839:5545 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: db724000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8435b680 r5:00001000 r4:eba2d000 r10:00000000 r9:8487ce80 r8:8027f5e8 r7:ebb6de60 r6:8487cf00 r5:85643c00 [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r4:e0631dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84be4100 [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8435b880 r5:85676b8c r4:85676800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85676b8c r4:8487cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85644800 r8:8487cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8487cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8487cf80 r8:8027f5e8 r7:ebb69e60 r6:850e8000 r5:85644800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb81fb0 to 0xebb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8435b640 INFO: task kworker/1:841:5550 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dba66000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r4:e0631dc0 r5:8436478c r4:84364400 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:842 state:D stack:0 pid:5551 tgid:5551 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfac1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred 1d60: 80230ad4 80239bb0 80070013 ffffffff [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:eba79d84 r8:00000002 r7:60000013 r6:eba79d8c r5:85648000 r4:85648000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85648000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba79e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8435bbc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85648000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8a63000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8567738c r4:85677000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8567738c r4:850e8180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85648000 r8:850e81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8180 r8:8027f5e8 r7:ebb85e60 r6:850e8200 r5:85648000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba79fb0 to 0xeba79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0631d28 to 0xe0631d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 Workqueue: events bpf_prog_free_deferred [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb0bd000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:82ac11e4 r4:e0631dc0 r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:845:5559 blocked for more than 475 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:845 state:D stack:0 pid:5559 tgid:5559 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebb95d84 r8:00000002 r7:60000013 r6:ebb95d8c r5:85648c00 r4:85648c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85648c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cd180 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85648c00 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85677b8c r4:85677800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85677b8c r4:850e8380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85648c00 r8:850e83ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8380 r4:00000001 Workqueue: events bpf_prog_free_deferred r4:82ac11e4 r5:00001000 r4:e01cf000 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:8564bc00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb257000 r4:850e8480 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb99fb0 to 0xebb99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd340 INFO: task kworker/1:846:5560 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dc6e0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:e01cf000 r4:8494cf80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb9de08 r5:00001000 r4:eb211000 r7:ddde2d80 r6:83018200 r5:85677f8c r4:850e8580 r10:61c88647 r9:8564c800 r8:850e85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8580 r8:8027f5e8 r7:ebb99e60 r6:850e8600 r5:8564c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb9dfb0 to 0xebb9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845f0080 INFO: task kworker/1:847:5563 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:829188dc r9:ebba1d84 r8:00000002 r7:60000113 r6:ebba1d8c r5:8564a400 r5:00001000 r4:eb3a9000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) INFO: task kworker/1:848:5564 is blocked on a mutex likely owned by task kworker/1:288:3824. r4:00000000 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:8494cf80 r4:00000001 Exception stack(0xe0631fb0 to 0xe0631ff8) r4:84be4100 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:849ce000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f04c0 r5:00001000 r4:eb2fb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845f00c0 INFO: task kworker/1:849:5567 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dce7f000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:850:5568 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:850 state:D stack:0 pid:5568 tgid:5568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebba5d84 r8:00000002 r7:60000013 r6:ebba5d8c r5:849cc800 r4:849cc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f0640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb343000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85680b8c r4:85680800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85680b8c r4:850e8800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cc800 r8:850e882c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8800 r8:8027f5e8 r7:ebba1e60 r6:851dc400 r5:849cc800 Exception stack(0xebba5fb0 to 0xebba5ff8) r4:845f00c0 task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0631d28 to 0xe0631d70) r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:851:5571 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:851 state:D stack:0 pid:5571 tgid:5571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebba9d84 r8:00000002 r7:60000013 r6:ebba9d8c r5:849cec00 r4:849cec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f0b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85681b8c r4:85681800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85681b8c r4:850e8880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cec00 r8:850e88ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8880 r8:8027f5e8 r7:ebba1e60 r6:851dc480 r5:849cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba9fb0 to 0xebba9ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/1:851:5571 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dd313000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:852:5572 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:852 state:D stack:0 pid:5572 tgid:5572 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbadd84 r8:00000002 r7:60000013 r6:ebbadd8c r5:849cd400 r4:849cd400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cd400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f08c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb401000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568138c r4:85681000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568138c r4:850e8900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cd400 r8:850e892c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8900 r8:8027f5e8 r7:ebba9e60 r6:851dc500 r5:849cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbadfb0 to 0xebbadff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:853:5574 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:853 state:D stack:0 pid:5574 tgid:5574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbb1d84 r8:00000002 r7:60000113 r6:ebbb1d8c r5:849cb000 r4:849cb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb1e08 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f0a40 r5:00001000 r4:eb49f000 r10:61c88647 r9:849cb000 r8:850e89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8980 r8:8027f5e8 r7:ebba9e60 r6:851dc580 r5:849cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb1fb0 to 0xebbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845f0780 INFO: task kworker/1:853:5574 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dd58d000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:854:5576 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:854 state:D stack:0 pid:5576 tgid:5576 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbb5d84 r8:00000002 r7:60000013 r6:ebbb5d8c r5:849cbc00 r4:849cbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:849cbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f0c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb55d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85681f8c r4:85681c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85681f8c r4:850e8a00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:849cbc00 r8:850e8a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8a00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8a00 r8:8027f5e8 r7:ebba9e60 r6:851dc600 r5:849cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbb5fb0 to 0xebbb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:845f0880 INFO: task kworker/1:854:5576 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dd930000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:855:5579 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:855 state:D stack:0 pid:5579 tgid:5579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbb9d84 r8:00000002 r7:60000013 r6:ebbb9d8c r5:847d8000 r4:847d8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:845f0dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847d8000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb679000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568238c r4:85682000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:847d8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbbde08 r9:83018205 r8:847d8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 r5:00001000 r4:eb877000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80070013 r4:80239bb0 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:857:5582 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:857 state:D stack:0 pid:5582 tgid:5582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbc1d84 r8:00000002 r7:60000113 r6:ebbc1d8c r5:847d9800 r4:847d9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847d9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cd340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb69d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568278c r4:85682400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568278c r4:850e8b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847d9800 r8:850e8bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8b80 r8:8027f5e8 r7:ebbbde60 r6:851dc780 r5:847d9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc1fb0 to 0xebbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:848cd3c0 INFO: task kworker/1:857:5582 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: de368000 e01a1000 00000001 80239b98 7f63f000 00000001 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebbc5d84 r8:00000002 r7:60000013 r6:ebbc5d8c r5:847da400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbc5e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:850e8c80 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf6080 INFO: task kworker/1:858:5584 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: de5e0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:859:5587 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:859 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbcdd84 r8:00000002 r7:60000113 r6:ebbcdd8c r5:847dbc00 r4:847dbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847dbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf6300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568378c r4:85683400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568378c r4:850e8c00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847dbc00 r8:850e8c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8c00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8c00 r8:8027f5e8 r7:ebbbde60 r6:851dc880 r5:847dbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbcdfb0 to 0xebbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf6340 INFO: task kworker/1:859:5587 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: de5e0000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 r4:84be4100 r4:847dc800 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf62c0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:84bf6340 r4:00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb8d5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85683b8c r4:85683800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85683b8c r4:850e8d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847de000 r8:850e8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:850e8d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:850e8d80 r8:8027f5e8 r7:ebbcde60 r6:851dc980 r5:847de000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbddfb0 to 0xebbddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf6440 INFO: task kworker/1:861:5591 is blocked on a mutex likely owned by task kworker/1:288:3824. task:kworker/1:288 state:R running task stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0631d28 to 0xe0631d70) 1d20: dea23000 e01a1000 00000001 80239b98 7f63f000 00000001 1d40: 82ac05a0 7f63f000 e01a1000 8280c930 82ac11c4 e0631da4 e0631da8 e0631d78 1d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe1e08 r5:00001000 r4:ebd09000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 r4:e0631dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be4240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01cf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8436478c r4:84364400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8436478c r4:8494cf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7bc00 r8:8494cfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8494cf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0631fb0 to 0xe0631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4100 Not tainted 6.15.0-syzkaller #0 r4:847db000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe9e08 r5:00001000 r4:eb8ff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847db000 r8:850e8eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r5:8436478c r4:84364400 r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r4:855a0000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:84a31b8c r4:84a31800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d60: 80230ad4 80239bb0 80070013 ffffffff [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbe5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85143dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae83000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a3178c r4:84a31400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a3178c r4:851dcc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a2400 r8:851dcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dcc00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcc00 r8:8027f5e8 r7:eba5de60 r6:851dcc80 r5:855a2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbe5fb0 to 0xebbe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7bc00 r8:80200be4 r7:e0631d5c r6:ffffffff r5:84b7bc00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:855a0c00 r4:00000000 r5:00001000 r4:ebd03000 r4:00000001 Workqueue: events bpf_prog_free_deferred r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0631dc0 r5:e0631e08 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:370:5603 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:370 state:D stack:0 pid:5603 tgid:5603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbf1d84 r8:00000002 r7:60000113 r6:ebbf1d8c r5:855a3000 r4:855a3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85143880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a3000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb505000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a30f8c r4:84a30c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84a30f8c r4:851dcd80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a3000 r8:851dcdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dcd80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xebbf1fb0 to 0xebbf1ff8) INFO: task kworker/0:370:5603 is blocked on a mutex likely owned by task kworker/1:288:3824. 1d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0631dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:8494cf80 r8:8027f5e8 r7:e0625e60 r6:84be5000 r5:84b7bc00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:855a3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 r5:00001000 r4:eb54b000 r7:dddced80 r6:83018000 r5:855f438c r4:851dce80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 9d60: 80230ad4 80239bb0 90070013 ffffffff [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:372:5607 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:372 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbf5d84 r8:00000002 r7:60000113 r6:ebbf5d8c r5:855a4800 r4:855a4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0180 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a4800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5a5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f478c r4:855f4400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f478c r4:851dcf80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a4800 r8:851dcfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851dcf80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851dcf80 r8:8027f5e8 r7:ebbc9e60 r6:84bee000 r5:855a4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf5fb0 to 0xebbf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae02c0 INFO: task kworker/0:372:5607 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 Exception stack(0xe0639d28 to 0xe0639d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r5:84364b8c r4:84364800 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:373:5610 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:373 state:D stack:0 pid:5610 tgid:5610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebbf9d84 r8:00000002 r7:60000113 r6:ebbf9d8c r5:855a5400 r4:855a5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbf9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb603000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f4b8c r4:855f4800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f4b8c r4:84bee080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a5400 r8:84bee0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee080 r8:8027f5e8 r7:ebbf5e60 r6:84bee100 r5:855a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbf9fb0 to 0xebbf9ff8) r4:84ae0300 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:00000000 r5:84364b8c r4:84364800 r4:84be5180 Exception stack(0xe0639fb0 to 0xe0639ff8) INFO: task kworker/0:374:5611 blocked for more than 476 seconds. r4:855a6000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb717000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee180 r8:8027f5e8 r7:ebbf9e60 r6:84bee200 r5:855a6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbfdfb0 to 0xebbfdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0300 INFO: task kworker/0:374:5611 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 7ff6f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 90070013 ffffffff r5:90070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 Not tainted 6.15.0-syzkaller #0 Call trace: r5:855a6c00 r4:829188d8 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc01e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0540 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb637000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f4f8c r4:855f4c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f4f8c r4:84bee280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a6c00 r8:84bee2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee280 r8:8027f5e8 r7:ebbfde60 r6:84bee300 r5:855a6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc01fb0 to 0xebc01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0300 INFO: task kworker/0:375:5613 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0639d28 to 0xe0639d70) r4:00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Not tainted 6.15.0-syzkaller #0 r4:00000000 r5:00001000 r4:eb72f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f578c r4:855f5400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f578c r4:84bee380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855a1800 r8:84bee3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee380 r8:8027f5e8 r7:ebbfde60 r6:84bee400 r5:855a1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc05fb0 to 0xebc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0640 INFO: task kworker/0:376:5615 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 807ce000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:377:5617 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:377 state:D stack:0 pid:5617 tgid:5617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc09d84 r8:00000002 r7:60000013 r6:ebc09d8c r5:84ac0000 r4:84ac0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc09e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0ac0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac0000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7a3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f5f8c r4:855f5c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f5f8c r4:84bee480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac0000 r8:84bee4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee480 r8:8027f5e8 r7:ebc05e60 r6:84bee500 r5:84ac0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc09fb0 to 0xebc09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0780 INFO: task kworker/0:377:5617 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 807ce000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:378:5620 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:378 state:D stack:0 pid:5620 tgid:5620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc0dd84 r8:00000002 r7:60000113 r6:ebc0dd8c r5:84ac0c00 r4:84ac0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0940 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb767000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f5b8c r4:855f5800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f5b8c r4:84bee580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac0c00 r8:84bee5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee580 r8:8027f5e8 r7:ebc09e60 r6:84bee600 r5:84ac0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc0dfb0 to 0xebc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:e0639dc0 r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/0:379 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84ac1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae0c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac1800 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb805000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f638c r4:855f6000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f638c r4:84bee680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac1800 r8:84bee6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee680 r8:8027f5e8 r7:ebc09e60 r6:84bee700 r5:84ac1800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:82ac11e4 r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebc15d84 r8:00000002 r7:60000113 r6:ebc15d8c r5:84ac2400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc15e08 r9:83018005 r8:84ac2400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r5:00001000 r4:eb823000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f678c r4:855f6400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f678c r4:84bee780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac2400 r8:84bee7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee780 r8:8027f5e8 r7:ebc11e60 r6:84bee800 r5:84ac2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc15fb0 to 0xebc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0c40 INFO: task kworker/0:380:5623 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8166e000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:5626 blocked for more than 476 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:5626 tgid:5626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc19d84 r8:00000002 r7:60000113 r6:ebc19d8c r5:84ac3000 r4:84ac3000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ac3000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a79040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac3000 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 r5:00001000 r4:eb843000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f6b8c r4:855f6800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f6b8c r4:84bee880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac3000 r8:84bee8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee880 r8:8027f5e8 r7:ebc15e60 r6:84bee900 r5:84ac3000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc19fb0 to 0xebc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a79080 INFO: task kworker/0:381:5626 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:84ac3c00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a79240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ac3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb861000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f6f8c r4:855f6c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f6f8c r4:84bee980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac3c00 r8:84bee9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bee980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bee980 r8:8027f5e8 r7:ebc19e60 r6:84beea00 r5:84ac3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:00001000 r4:eb9ab000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0639d28 to 0xe0639d70) r5:00001000 r4:e01e9000 r4:00000001 Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a79300 r5:00001000 r4:eb919000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:855f738c r4:855f7000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:855f738c r4:84beeb80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ac5400 r8:84beebac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84beeb80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84beeb80 r8:8027f5e8 r7:ebc21e60 r6:84beec00 r5:84ac5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc25fb0 to 0xebc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84a79340 INFO: task kworker/0:384:5631 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84be4200 r10:829188dc r9:ebc29d84 r8:00000002 r7:60000013 r6:ebc29d8c r5:84ac6c00 r5:00001000 r4:eb9d5000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:386:5635 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:386 state:D stack:0 pid:5635 tgid:5635 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc31d84 r8:00000002 r7:60000113 r6:ebc31d8c r5:855a8000 r4:855a8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855a8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc31e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb9bf000 r10:61c88647 r9:855a8000 r8:84beedac r7:82804d40 r6:dddced80 r5:dddceda0 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:387 state:D stack:0 pid:5637 tgid:5637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc2dd84 r8:00000002 r7:60000013 r6:ebc2dd8c r5:855a8c00 r4:855a8c00 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r5:855a9800 r4:829188d8 r5:00001000 r4:eba21000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84a79a00 INFO: task kworker/0:388:5639 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 82ae4000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r5:8564d400 r4:829188d8 r5:00001000 r4:eba09000 r7:dddced80 r6:83018000 r5:8560078c r4:848e9080 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Workqueue: events bpf_prog_free_deferred [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:85600f8c r4:85600c00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 83198000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba43000 r4:848e9180 INFO: task kworker/0:391:5645 is blocked on a mutex likely owned by task kworker/1:290:3828. r5:00001000 r4:e01e9000 r4:00000001 INFO: task kworker/0:392:5647 blocked for more than 477 seconds. [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:392:5647 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 836db000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0639fb0 to 0xe0639ff8) r4:84be4200 task:kworker/0:393 state:D stack:0 pid:5648 tgid:5648 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc59d84 r8:00000002 r7:60000113 r6:ebc59d8c r5:8564ec00 r4:8564ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8564ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855341c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8564ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba55000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560178c r4:85601400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560178c r4:848e9280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8564ec00 r8:848e92ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9280 r8:8027f5e8 r7:ebc55e60 r6:85533180 r5:8564ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc59fb0 to 0xebc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855342c0 INFO: task kworker/0:393:5648 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r4:e0639dc0 r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 INFO: task kworker/0:394:5650 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:394 state:D stack:0 pid:5650 tgid:5650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc61d84 r8:00000002 r7:60000113 r6:ebc61d8c r5:85646000 r4:85646000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85646000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85534340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85646000 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba61000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85601b8c r4:85601800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85601b8c r4:848e9300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85646000 r8:848e932c r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9300 r8:8027f5e8 r7:ebc55e60 r6:85533200 r5:85646000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc61fb0 to 0xebc61ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:394:5650 is blocked on a mutex likely owned by task kworker/1:290:3828. Exception stack(0xe0639d28 to 0xe0639d70) r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:395:5652 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:395 state:D stack:0 pid:5652 tgid:5652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r4:85646c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08 r5:00001000 r4:eba7b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0639d28 to 0xe0639d70) [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:5654 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:5654 tgid:5654 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc75d84 r8:00000002 r7:60000113 r6:ebc75d8c r5:85650c00 r4:85650c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85650c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:eba83000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:85650c00 r8:848e942c r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:396:5654 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 84909000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ebc7b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85534540 INFO: task kworker/0:397:5656 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 84909000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 Exception stack(0xe0639fb0 to 0xe0639ff8) task:kworker/0:398 state:D stack:0 pid:5659 tgid:5659 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc79e08 r9:83018005 r8:855abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 r5:00001000 r4:ebc95000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560338c r4:85603000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560338c r4:848e9580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855abc00 r8:848e95ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9580 r8:8027f5e8 r7:ebc55e60 r6:848e9600 r5:855abc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc79fb0 to 0xebc79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85534780 INFO: task kworker/0:398:5659 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 84fa9000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be5180 r4:00000001 Exception stack(0xe0639fb0 to 0xe0639ff8) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:855ac800 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85602f8c r4:85602c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:848e9680 r10:00000000 r9:848e9680 r8:8027f5e8 r7:ebc79e60 r6:848e9700 r5:855ac800 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 84fa9000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:400:5664 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:400 state:D stack:0 pid:5664 tgid:5664 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebc99d84 r8:00000002 r7:60000013 r6:ebc99d8c r5:855ad400 r4:855ad400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ad400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc99e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85534c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560378c r4:85603400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560378c r4:848e9780 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ad400 r8:848e97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9780 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9780 r8:8027f5e8 r7:ebc79e60 r6:848e9800 r5:855ad400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc99fb0 to 0xebc99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85534b00 INFO: task kworker/0:400:5664 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 852bd000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:401:5665 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:401 state:D stack:0 pid:5665 tgid:5665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcadd84 r8:00000002 r7:60000013 r6:ebcadd8c r5:855ae000 r4:855ae000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855ae000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcade08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508080 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcbd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560c38c r4:8560c000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560c38c r4:848e9880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855ae000 r8:848e98ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9880 r8:8027f5e8 r7:ebc99e60 r6:848e9900 r5:855ae000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcadfb0 to 0xebcadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85534bc0 INFO: task kworker/0:401:5665 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 859a8000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:5667 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:5667 tgid:5667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcb5d84 r8:00000002 r7:60000013 r6:ebcb5d8c r5:855aa400 r4:855aa400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:855aa400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcb5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85534dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebca9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85603b8c r4:85603800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85603b8c r4:848e9980 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:855aa400 r8:848e99ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9980 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9980 r8:8027f5e8 r7:ebcade60 r6:848e9a00 r5:855aa400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcb5fb0 to 0xebcb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85534e80 INFO: task kworker/0:402:5667 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 85da2000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:5669 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:5669 tgid:5669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcc1d84 r8:00000002 r7:60000013 r6:ebcc1d8c r5:847f0c00 r4:847f0c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcc1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a79680 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85603f8c r4:85603c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85603f8c r4:848e9a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f0c00 r8:848e9aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9a80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9a80 r8:8027f5e8 r7:ebcade60 r6:848e9b00 r5:847f0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcc1fb0 to 0xebcc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84ae0e80 INFO: task kworker/0:403:5669 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 860e8000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:5671 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:5671 tgid:5671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcd1d84 r8:00000002 r7:60000013 r6:ebcd1d8c r5:847f0000 r4:847f0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcd1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85508500 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560cb8c r4:8560c800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560cb8c r4:848e9b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f0000 r8:848e9bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9b80 r8:8027f5e8 r7:ebcade60 r6:848e9c00 r5:847f0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcd1fb0 to 0xebcd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85508040 INFO: task kworker/0:404:5671 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 860e8000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:405:5673 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:405 state:D stack:0 pid:5673 tgid:5673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcd5d84 r8:00000002 r7:60000013 r6:ebcd5d8c r5:847f3000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebcc7000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:82ac11e4 r5:00001000 r4:e01e9000 r4:00000001 Not tainted 6.15.0-syzkaller #0 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebcdf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560cf8c r4:8560cc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560cf8c r4:848e9d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f3c00 r8:848e9dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9d80 r8:8027f5e8 r7:ebcd1e60 r6:848e9e00 r5:847f3c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcddfb0 to 0xebcddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855084c0 INFO: task kworker/0:406:5675 is blocked on a mutex likely owned by task kworker/1:290:3828. 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:407:5677 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebcedd84 r8:00000002 r7:60000113 r6:ebcedd8c r5:847f4800 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r5:00001000 r4:ebce5000 r5:8560d38c r4:8560d000 r10:00000000 r9:848e9e80 r8:8027f5e8 r7:ebcdde60 r6:848e9f00 r5:847f4800 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r4:00000001 INFO: task kworker/0:408:5679 blocked for more than 477 seconds. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebcf1e08 r5:00001000 r4:ebcf9000 r10:61c88647 r9:847f1800 r8:848e9fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:848e9f80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:848e9f80 r8:8027f5e8 r7:ebcede60 r6:85512000 r5:847f1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebcf1fb0 to 0xebcf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85508840 INFO: task kworker/0:408:5679 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 872f6000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:409:5681 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:409 state:D stack:0 pid:5681 tgid:5681 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebcf3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:847f5400 r8:855120ac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebd0dd84 r8:00000002 r7:60000113 r6:ebd0dd8c r5:847f2400 r4:847f2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518700 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:847f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb381000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560e38c r4:8560e000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560e38c r4:85512180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f2400 r8:855121ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512180 r8:8027f5e8 r7:ebcf1e60 r6:85512200 r5:847f2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd0dfb0 to 0xebd0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85508700 INFO: task kworker/0:410:5683 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) Exception stack(0xe0639d28 to 0xe0639d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r5:84364b8c r4:84364800 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd1dd84 r8:00000002 r7:60000113 r6:ebd1dd8c r5:847f6000 r4:847f6000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:847f6000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd1de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552c240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:847f6000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb24d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85689b8c r4:85689800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85689b8c r4:85533380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:847f6000 r8:855333ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85533380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533380 r8:8027f5e8 r7:ebbe1e60 r6:85512280 r5:847f6000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd1dfb0 to 0xebd1dff8) dfa0: 00000000 00000000 00000000 00000000 r4:8552cc80 Workqueue: events bpf_prog_free_deferred 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:e0639dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:866 state:D stack:0 pid:5687 tgid:5687 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc8de08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85533400 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:e0639dc0 r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:867:5689 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:867 state:D stack:0 pid:5689 tgid:5689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd19d84 r8:00000002 r7:60000113 r6:ebd19d8c r5:85650000 r4:85650000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85650000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552cb80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85650000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac1b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85688f8c r4:85688c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85688f8c r4:85533500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85650000 r8:8553352c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85533500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533500 r8:8027f5e8 r7:ebd1de60 r6:85533580 r5:85650000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd19fb0 to 0xebd19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8552cf00 INFO: task kworker/1:867:5689 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 885ec000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:5691 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:5691 tgid:5691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd25d84 r8:00000002 r7:60000113 r6:ebd25d8c r5:85653000 r4:85653000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85653000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd25e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518480 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85653000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1e3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568978c r4:85689400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8568978c r4:85512300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85653000 r8:8551232c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512300 r8:8027f5e8 r7:ebd0de60 r6:85533600 r5:85653000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd25fb0 to 0xebd25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85518100 INFO: task kworker/0:411:5691 is blocked on a mutex likely owned by task kworker/1:290:3828. Workqueue: events bpf_prog_free_deferred r4:82ac11e4 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85653c00 r4:829188d8 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8552c5c0 r5:00001000 r4:eb081000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebd29fb0 to 0xebd29ff8) r4:8552c7c0 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:869:5696 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:869 state:D stack:0 pid:5696 tgid:5696 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85654800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd2de08 r5:00001000 r4:eb53b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Not tainted 6.15.0-syzkaller #0 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cd600 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85655400 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85689f8c r4:85689c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85689f8c r4:85533880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85655400 r8:855338ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85533880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533880 r8:8027f5e8 r7:ebd2de60 r6:85533900 r5:85655400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd31fb0 to 0xebd31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/1:871:5700 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:871 state:D stack:0 pid:5700 tgid:5700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd11d84 r8:00000002 r7:60000113 r6:ebd11d8c r5:85656000 r4:85656000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85656000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd11e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebdf9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85533980 r4:85508f40 r4:00000000 r4:82ac11e4 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:829188dc r9:ebd39d84 r8:00000002 r7:60000013 r6:ebd39d8c r5:85656c00 r4:00000000 r5:00001000 r4:eb455000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:413:5704 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:413 state:D stack:0 pid:5704 tgid:5704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:829188dc r9:ebd41d84 r8:00000002 r7:60000013 r6:ebd41d8c r5:84ac6000 r4:00000000 r4:00000000 r5:00001000 r4:eb4bd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8560eb8c r4:8560e800 r10:61c88647 r9:84ac6000 r8:8551242c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:85518800 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r4:e0639dc0 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:856a0c00 r4:829188d8 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85518a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560ef8c r4:8560ec00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560ef8c r4:85512480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856a0c00 r8:855124ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512480 r8:8027f5e8 r7:ebd41e60 r6:85533b80 r5:856a0c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd49fb0 to 0xebd49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855188c0 INFO: task kworker/0:414:5706 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 89c16000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e01e9000 r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 r4:84be5180 Exception stack(0xe0639fb0 to 0xe0639ff8) Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb88d000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) INFO: task kworker/0:415:5709 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 89dd8000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:5710 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:5710 tgid:5710 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb68f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8560f38c r4:85512580 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84be5180 Exception stack(0xe0639fb0 to 0xe0639ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018005 r8:855aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 r5:00001000 r4:eb707000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebd35fb0 to 0xebd35ff8) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85518b00 INFO: task kworker/0:417:5711 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8a55b000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 r4:847f6c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd51e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8f7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85512700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512700 r8:8027f5e8 r7:ebd55e60 r6:85512780 r5:847f6c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd51fb0 to 0xebd51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855180c0 INFO: task kworker/0:418:5715 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8a708000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebd3dd84 r8:00000002 r7:60000013 r6:ebd3dd8c r5:856b0000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8bb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8560ff8c r4:8560fc00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8560ff8c r4:85512800 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b0000 r8:8551282c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512800 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512800 r8:8027f5e8 r7:ebd51e60 r6:85512880 r5:856b0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd3dfb0 to 0xebd3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855180c0 INFO: task kworker/0:419:5716 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:00000000 r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:420 state:D stack:0 pid:5718 tgid:5718 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856b0c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550e1c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd6d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85614b8c r4:85614800 r7:dddced80 r6:83018000 r5:85614b8c r4:85512900 Exception stack(0xebd61fb0 to 0xebd61ff8) INFO: task kworker/0:420:5718 is blocked on a mutex likely owned by task kworker/1:290:3828. 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:ebd71d84 r8:00000002 r7:60000113 r6:ebd71d8c r5:856b1800 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebbd7000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:422:5722 blocked for more than 477 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:422 state:D stack:0 pid:5722 tgid:5722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd65d84 r8:00000002 r7:60000013 r6:ebd65d8c r5:856b2400 r4:856b2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550e3c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856b2400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85614f8c r4:85614c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85614f8c r4:85512b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b2400 r8:85512b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512b00 r8:8027f5e8 r7:ebd61e60 r6:85512b80 r5:856b2400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd65fb0 to 0xebd65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550e300 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd79e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8561538c r4:85615000 r4:85512c00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8bb8f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:ebd85d84 r8:00000002 r7:60000013 r6:ebd85d8c r5:856b3c00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebd8f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8bb8f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebda1d84 r8:00000002 r7:60000013 r6:ebda1d8c r5:856a2400 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebd95000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:426 state:D stack:0 pid:5730 tgid:5730 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:ebda7000 r5:85615f8c r4:85615c00 r4:85512e80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:5732 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:5732 tgid:5732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd99d84 r8:00000002 r7:60000113 r6:ebd99d8c r5:856b4800 r4:856b4800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b4800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd99e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550ec80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdbf000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8561678c r4:85616400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561678c r4:85512f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b4800 r8:85512f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85512f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85512f00 r8:8027f5e8 r7:ebdb1e60 r6:85512f80 r5:856b4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd99fb0 to 0xebd99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550e8c0 INFO: task kworker/0:427:5732 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8c635000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) INFO: task kworker/0:428:5733 blocked for more than 478 seconds. r4:856b5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd8de08 r5:00001000 r4:ebdad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebd8dfb0 to 0xebd8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550e8c0 INFO: task kworker/0:428:5733 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8c635000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:429 state:D stack:0 pid:5737 tgid:5737 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebdc5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 r5:84364b8c r4:84364800 r4:84be5180 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:430 state:D stack:0 pid:5738 tgid:5738 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebdd3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebdc9fb0 to 0xebdc9ff8) task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:00000000 r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:5741 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:5741 tgid:5741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebdd1d84 r8:00000002 r7:60000113 r6:ebdd1d8c r5:84ad0000 r4:84ad0000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ad0000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdd1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad0000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdd9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8561738c r4:85617000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561738c r4:84bf4300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad0000 r8:84bf432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bf4300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf4300 r8:8027f5e8 r7:ebdc9e60 r6:84bf4380 r5:84ad0000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r4:84be4200 Workqueue: events bpf_prog_free_deferred r5:84ad0c00 r4:829188d8 r4:00000000 r4:00000000 r5:00001000 r4:ebdf3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:432:5742 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8dd36000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:5743 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:5743 tgid:5743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebdbdd84 r8:00000002 r7:60000013 r6:ebdbdd8c r5:84ad2400 r4:84ad2400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ad2400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebdbde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad2400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebde7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8561778c r4:85617400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8561778c r4:84bf4500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad2400 r8:84bf452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf5300 INFO: task kworker/0:433:5743 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8e2d9000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r4:e0639dc0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebdfdd84 r8:00000002 r7:60000013 r6:ebdfdd8c r5:84ad3c00 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:ebded000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebdfdfb0 to 0xebdfdff8) task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:e0639dc0 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebe01d84 r8:00000002 r7:60000013 r6:ebe01d8c r5:84ad4800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe01e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe0b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562038c r4:85620000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562038c r4:84bf4700 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad4800 r8:84bf472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bf4700 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf4700 r8:8027f5e8 r7:ebddde60 r6:84bf4780 r5:84ad4800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe01fb0 to 0xebe01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84bf5600 INFO: task kworker/0:435:5747 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8e95d000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb0e7000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568a78c r4:8568a400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568a78c r4:85533e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad1800 r8:85533e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85533e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533e00 r8:8027f5e8 r7:ebd2de60 r6:84bf4800 r5:84ad1800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe09fb0 to 0xebe09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85531200 INFO: task kworker/1:872:5750 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 8f139000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 r4:00000000 r5:84364b8c r4:84364800 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:829188dc r9:ebe19d84 r8:00000002 r7:60000113 r6:ebe19d8c r5:84ad5400 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe19e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe11000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562078c r4:85620400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562078c r4:84bf4880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad5400 r8:84bf48ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bf4880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84ad6000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be4200 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe29d84 r8:00000002 r7:60000113 r6:ebe29d8c r5:84ad6c00 r4:84ad6c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ad6c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe29e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf5e00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ad6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe1f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85620b8c r4:85620800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85620b8c r4:84bf4a80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad6c00 r8:84bf4aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84be4200 Workqueue: events bpf_prog_free_deferred [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:85620f8c r4:85620c00 Exception stack(0xebe1dfb0 to 0xebe1dff8) Call trace: [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Not tainted 6.15.0-syzkaller #0 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb7dd000 r10:61c88647 r9:856b8000 r8:85533eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:e0639dc0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) task:kworker/1:874 state:D stack:0 pid:5766 tgid:5766 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eb5db000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568af8c r4:8568ac00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568af8c r4:85533f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b9800 r8:85533f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85533f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85533f00 r8:8027f5e8 r7:ebc6de60 r6:84bf4d00 r5:856b9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc85fb0 to 0xebc85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415380 INFO: task kworker/1:874:5766 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 906d3000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84be4200 r4:856bb000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r5:00001000 r4:eb62b000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:5769 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:5769 tgid:5769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe51d84 r8:00000002 r7:60000113 r6:ebe51d8c r5:856b8c00 r4:856b8c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856b8c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe51e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85422140 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebe41000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562178c r4:85621400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562178c r4:84bf4e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856b8c00 r8:84bf4e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bf4e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf4e00 r8:8027f5e8 r7:ebde5e60 r6:84bf4e80 r5:856b8c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe51fb0 to 0xebe51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85422400 INFO: task kworker/0:440:5769 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 90dbf000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:441:5771 blocked for more than 478 seconds. Workqueue: events bpf_prog_free_deferred r4:856bc800 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509dc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebce1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8562238c r4:85622000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562238c r4:84bf4f00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bc800 r8:84bf4f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bf4f00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bf4f00 r8:8027f5e8 r7:ebe51e60 r6:84bf4f80 r5:856bc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe59fb0 to 0xebe59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85422980 INFO: task kworker/0:441:5771 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9107f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84be4200 Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:856bd400 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r9:83018005 r8:856bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 r5:00001000 r4:dfacb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85621b8c r4:85621800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85621b8c r4:85418000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bd400 r8:8541802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85418000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85418000 r8:8027f5e8 r7:ebe59e60 r6:85418080 r5:856bd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe5dfb0 to 0xebe5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85422980 INFO: task kworker/0:442:5772 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9160f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:876:5773 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:876 state:D stack:0 pid:5773 tgid:5773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe61d84 r8:00000002 r7:60000113 r6:ebe61d8c r5:856ba400 r4:856ba400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ba400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854157c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb719000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568b78c r4:8568b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568b78c r4:856d2080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ba400 r8:856d20ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2080 r8:8027f5e8 r7:ebc6de60 r6:85418100 r5:856ba400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe61fb0 to 0xebe61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415580 INFO: task kworker/1:876:5773 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9160f000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:877:5775 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:877 state:D stack:0 pid:5775 tgid:5775 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe69d84 r8:00000002 r7:60000113 r6:ebe69d8c r5:856bec00 r4:856bec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856bec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe69e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415880 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb763000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8568bb8c r4:8568b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8568bb8c r4:856d2000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bec00 r8:856d202c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2000 r8:8027f5e8 r7:ebc6de60 r6:85418180 r5:856bec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe69fb0 to 0xebe69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415740 INFO: task kworker/1:877:5775 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 919f9000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:878:5777 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:878 state:D stack:0 pid:5777 tgid:5777 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe71d84 r8:00000002 r7:60000113 r6:ebe71d8c r5:84ad8000 r4:84ad8000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ad8000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe71e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85531a40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad8000 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba37000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574178c r4:85741400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574178c r4:856d2100 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad8000 r8:856d212c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2100 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2100 r8:8027f5e8 r7:ebc6de60 r6:85418200 r5:84ad8000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe71fb0 to 0xebe71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415840 INFO: task kworker/1:878:5777 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 91d1d000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:879:5779 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:879 state:D stack:0 pid:5779 tgid:5779 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe79d84 r8:00000002 r7:60000113 r6:ebe79d8c r5:84ad9800 r4:84ad9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ad9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe79e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415b80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84ad9800 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb819000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84a31f8c r4:84a31c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84a31f8c r4:856d2180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ad9800 r8:856d21ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2180 r8:8027f5e8 r7:ebe71e60 r6:85418280 r5:84ad9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe79fb0 to 0xebe79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:854159c0 INFO: task kworker/1:879:5779 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 91d1d000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:5780 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:5780 tgid:5780 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe7dd84 r8:00000002 r7:60000013 r6:ebe7dd8c r5:84ada400 r4:84ada400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84ada400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe7de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853f1c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84ada400 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb74d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450bb8c r4:8450b800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8450bb8c r4:85418300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84ada400 r8:8541832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85418300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85418300 r8:8027f5e8 r7:ebe59e60 r6:85418380 r5:84ada400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe7dfb0 to 0xebe7dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85422c40 INFO: task kworker/0:443:5780 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 92496000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:880:5782 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:880 state:D stack:0 pid:5782 tgid:5782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe85d84 r8:00000002 r7:60000113 r6:ebe85d8c r5:84adbc00 r4:84adbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84adbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe85e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415c40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84adbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb84d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8450b78c r4:8450b400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8450b78c r4:856d2200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84adbc00 r8:856d222c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2200 r8:8027f5e8 r7:ebe71e60 r6:85418400 r5:84adbc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:881:5784 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:881 state:D stack:0 pid:5784 tgid:5784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r5:84add400 r4:829188d8 r4:00000000 r4:00000000 r5:00001000 r4:eb917000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:61c88647 r9:84add400 r8:856d22ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:882:5786 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:882 state:D stack:0 pid:5786 tgid:5786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe95d84 r8:00000002 r7:60000113 r6:ebe95d8c r5:84adc800 r4:84adc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84adc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe95e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85415f00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84adc800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ad000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574078c r4:85740400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574078c r4:856d2300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84adc800 r8:856d232c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2300 r8:8027f5e8 r7:ebe71e60 r6:85418500 r5:84adc800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe95fb0 to 0xebe95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415fc0 INFO: task kworker/1:882:5786 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:883:5788 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:883 state:D stack:0 pid:5788 tgid:5788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe9dd84 r8:00000002 r7:60000113 r6:ebe9dd8c r5:84adec00 r4:84adec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:84adec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe9de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85422c80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84adec00 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9cb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85740b8c r4:85740800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85740b8c r4:856d2380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84adec00 r8:856d23ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:856d2380 r8:8027f5e8 r7:ebe71e60 r6:85418580 r5:84adec00 INFO: task kworker/1:883:5788 is blocked on a mutex likely owned by task kworker/1:290:3828. 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:884 state:D stack:0 pid:5790 tgid:5790 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb9f3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebea5fb0 to 0xebea5ff8) task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:885:5792 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:885 state:D stack:0 pid:5792 tgid:5792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebeb1d84 r8:00000002 r7:60000113 r6:ebeb1d8c r5:856bbc00 r4:856bbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856bbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebeb1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:848cd4c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba19000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574138c r4:85741000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574138c r4:856d2480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856bbc00 r8:856d24ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2480 r8:8027f5e8 r7:ebe71e60 r6:85418680 r5:856bbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebeb1fb0 to 0xebeb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85415f40 INFO: task kworker/1:885:5792 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9329d000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 INFO: task kworker/1:886:5796 blocked for more than 478 seconds. r4:856c8c00 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebec9e08 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc5b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8574278c r4:856d2500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:8550b100 Call trace: Exception stack(0xe0639d28 to 0xe0639d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e01e9000 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:887:5797 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:887 state:D stack:0 pid:5797 tgid:5797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebecdd84 r8:00000002 r7:60000013 r6:ebecdd8c r5:856c9800 r4:856c9800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856c9800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebecde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba4d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85741b8c r4:85741800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85741b8c r4:856d2580 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856c9800 r8:856d25ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2580 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2580 r8:8027f5e8 r7:ebec9e60 r6:85418780 r5:856c9800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebecdfb0 to 0xebecdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550b2c0 INFO: task kworker/1:887:5797 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 93f50000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:888 state:D stack:0 pid:5798 tgid:5798 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6d000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:856d2600 r8:8027f5e8 r7:ebec9e60 r6:856d2680 r5:856a4800 INFO: task kworker/1:888:5798 is blocked on a mutex likely owned by task kworker/1:290:3828. Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 93f50000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:889:5801 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:889 state:D stack:0 pid:5801 tgid:5801 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebed1d84 r8:00000002 r7:60000113 r6:ebed1d8c r5:856a1800 r4:856a1800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856a1800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed1e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b380 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba81000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8574238c r4:856d2700 r10:00000000 r9:856d2700 r8:8027f5e8 r7:ebec9e60 r6:856d2780 r5:856a1800 INFO: task kworker/1:889:5801 is blocked on a mutex likely owned by task kworker/1:290:3828. 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ebc87000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85742f8c r4:856d2800 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:891:5805 blocked for more than 478 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:891 state:D stack:0 pid:5805 tgid:5805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebe39d84 r8:00000002 r7:60000113 r6:ebe39d8c r5:856a5400 r4:856a5400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856a5400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebe39e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550b640 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc71000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85742b8c r4:85742800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85742b8c r4:856d2900 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856a5400 r8:856d292c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2900 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2900 r8:8027f5e8 r7:ebed5e60 r6:856d2980 r5:856a5400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebe39fb0 to 0xebe39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550b880 INFO: task kworker/1:891:5805 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebedde08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:ebca5000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:856d2a00 r8:8027f5e8 r7:ebed5e60 r6:856d2a80 r5:85652400 INFO: task kworker/1:892:5807 is blocked on a mutex likely owned by task kworker/1:290:3828. Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r5:84364b8c r4:84364800 r4:84be5180 Exception stack(0xe0639fb0 to 0xe0639ff8) INFO: task kworker/1:893:5808 blocked for more than 478 seconds. r4:85658000 r4:00000000 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550ba00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85658000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc93000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574338c r4:85743000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574338c r4:856d2b00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85658000 r8:856d2b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2b00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2b00 r8:8027f5e8 r7:ebedde60 r6:856d2b80 r5:85658000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebee1fb0 to 0xebee1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550bb00 INFO: task kworker/1:893:5808 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 94e48000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:894:5812 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:894 state:D stack:0 pid:5812 tgid:5812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebed9d84 r8:00000002 r7:60000113 r6:ebed9d8c r5:85658c00 r4:85658c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85658c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebed9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8550bcc0 r4:00000000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcb1000 r5:85743b8c r4:85743800 r4:856d2c00 Exception stack(0xebed9fb0 to 0xebed9ff8) INFO: task kworker/1:894:5812 is blocked on a mutex likely owned by task kworker/1:290:3828. Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 94e48000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:895:5813 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:895 state:D stack:0 pid:5813 tgid:5813 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:85659800 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebcc3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:85743f8c r4:856d2d00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebccb000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574438c r4:85744000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574438c r4:856d2e00 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565a400 r8:856d2e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:856d2e00 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:856d2e00 r8:8027f5e8 r7:ebee9e60 r6:856d2e80 r5:8565a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebeedfb0 to 0xebeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8550be40 INFO: task kworker/1:896:5815 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 952c3000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:8565bc00 [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebce9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xebef5fb0 to 0xebef5ff8) task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0639fb0 to 0xe0639ff8) Not tainted 6.15.0-syzkaller #0 r10:829188dc r9:ebefdd84 r8:00000002 r7:60000013 r6:ebefdd8c r5:8565c800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebefde08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855376c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8565c800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85744f8c r4:85744c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85744f8c r4:85530000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565c800 r8:8553002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530000 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530000 r8:8027f5e8 r7:ebef5e60 r6:85530080 r5:8565c800 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebefdfb0 to 0xebefdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:855370c0 INFO: task kworker/1:898:5820 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 95839000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:5821 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:5821 tgid:5821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf01e08 r9:83018005 r8:8565d400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 r5:00001000 r4:ebc5d000 r5:85622f8c r4:85622c00 r10:61c88647 r9:8565d400 r8:8541882c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:899:5823 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:899 state:D stack:0 pid:5823 tgid:5823 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebd89d84 r8:00000002 r7:60000113 r6:ebd89d8c r5:8565ec00 r4:8565ec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:8565ec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebd89e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855374c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8565ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebcff000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85744b8c r4:85744800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85744b8c r4:85530180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8565ec00 r8:855301ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530180 r8:8027f5e8 r7:ebefde60 r6:85530200 r5:8565ec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebd89fb0 to 0xebd89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85537480 INFO: task kworker/1:899:5823 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9622d000 e01b3000 00000001 80239b98 7f641000 00000001 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:8565e000 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 r5:00001000 r4:eb067000 r7:ddde2d80 r6:83018200 r5:8574578c r4:85530280 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9622d000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:901:5827 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:901 state:D stack:0 pid:5827 tgid:5827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebef9d84 r8:00000002 r7:60000113 r6:ebef9d8c r5:85780000 r4:85780000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85780000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebef9e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855378c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85780000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e024d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r7:ddde2d80 r6:83018200 r5:8574538c r4:85530380 Exception stack(0xebef9fb0 to 0xebef9ff8) INFO: task kworker/1:901:5827 is blocked on a mutex likely owned by task kworker/1:290:3828. 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:902:5829 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:902 state:D stack:0 pid:5829 tgid:5829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebee5d84 r8:00000002 r7:60000113 r6:ebee5d8c r5:85780c00 r4:85780c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85780c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebee5e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85537b40 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85780c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1ef000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85745b8c r4:85745800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85745b8c r4:85530480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85780c00 r8:855304ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530480 r8:8027f5e8 r7:ebf05e60 r6:85530500 r5:85780c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r5:00001000 r4:e01e9000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:85781800 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 r5:00001000 r4:eb677000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r4:85530580 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r4:00000000 r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:904:5833 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:904 state:D stack:0 pid:5833 tgid:5833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf0dd84 r8:00000002 r7:60000013 r6:ebf0dd8c r5:85782400 r4:85782400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85782400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf0de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85537cc0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85782400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2d9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85745f8c r4:85745c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85745f8c r4:85530680 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85782400 r8:855306ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530680 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530680 r8:8027f5e8 r7:ebf09e60 r6:85530700 r5:85782400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf0dfb0 to 0xebf0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85537c00 INFO: task kworker/1:904:5833 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 967e6000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85783000 r4:829188d8 [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) r5:00001000 r4:eb3bd000 [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r10:00000000 r9:85530780 r8:8027f5e8 r7:ebf09e60 r6:85530800 r5:85783000 r4:85537c00 Call trace: Exception stack(0xe0639d28 to 0xe0639d70) [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:906:5837 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:906 state:D stack:0 pid:5837 tgid:5837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf15d84 r8:00000002 r7:60000013 r6:ebf15d8c r5:85783c00 r4:85783c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85783c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf15e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84361040 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85783c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4af000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574678c r4:85746400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574678c r4:85530880 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85783c00 r8:855308ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530880 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530880 r8:8027f5e8 r7:ebf09e60 r6:85530900 r5:85783c00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf15fb0 to 0xebf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84361280 INFO: task kworker/1:906:5837 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 97174000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-syzkaller #0 r4:85784800 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf19e08 r4:00000000 r5:00001000 r4:eb89f000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 97813000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:908:5841 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:908 state:D stack:0 pid:5841 tgid:5841 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf21d84 r8:00000002 r7:60000013 r6:ebf21d8c r5:85785400 r4:85785400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85785400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf21e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84361300 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85785400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 r5:00001000 r4:eb6dd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85746f8c r4:85746c00 r4:85530a80 Exception stack(0xebf21fb0 to 0xebf21ff8) r4:84361580 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 r5:84364b8c r4:84364800 r4:84be5180 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85786000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8ed000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8574778c r4:85747400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8574778c r4:85530b80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85786000 r8:85530bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530b80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530b80 r8:8027f5e8 r7:ebf19e60 r6:85530c00 r5:85786000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf1dfb0 to 0xebf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84361400 INFO: task kworker/1:909:5843 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 98180000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:910:5845 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ebbd3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:82ac11e4 r4:00000000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:84be4200 task:kworker/1:911 state:D stack:0 pid:5847 tgid:5847 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf35e08 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85788000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd07000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85747f8c r4:85747c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85747f8c r4:85530d80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85788000 r8:85530dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85530d80 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85530d80 r8:8027f5e8 r7:ebf2de60 r6:85530e00 r5:85788000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf35fb0 to 0xebf35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:843616c0 INFO: task kworker/1:911:5847 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 98180000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:912:5849 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:912 state:D stack:0 pid:5849 tgid:5849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf39d84 r8:00000002 r7:60000113 r6:ebf39d8c r5:85788c00 r4:85788c00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:85788c00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf39e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84361a00 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85788c00 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd21000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575438c r4:85754000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575438c r4:85530e80 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:85788c00 r8:85530eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0639d28 to 0xe0639d70) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf3de08 r5:00001000 r4:ebd4b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85530f80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 98776000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:914:5853 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:914 state:D stack:0 pid:5853 tgid:5853 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r4:8578a400 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:ebd5d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85754b8c r4:85754800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85754b8c r4:8515c080 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578a400 r8:8515c0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c080 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c080 r8:8027f5e8 r7:ebf3de60 r6:8515c100 r5:8578a400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf41fb0 to 0xebf41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84361b40 INFO: task kworker/1:914:5853 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 992fd000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:915:5855 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:915 state:D stack:0 pid:5855 tgid:5855 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf4dd84 r8:00000002 r7:60000013 r6:ebf4dd8c r5:856cc800 r4:856cc800 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cc800 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf4de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85537d80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cc800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd6b000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85754f8c r4:85754c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85754f8c r4:8515c180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cc800 r8:8515c1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c180 r8:8027f5e8 r7:ebf41e60 r6:85418880 r5:856cc800 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0639d28 to 0xe0639d70) r4:82ac11e4 r4:e0639dc0 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:916:5858 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:916 state:D stack:0 pid:5858 tgid:5858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf55d84 r8:00000002 r7:60000013 r6:ebf55d8c r5:856ca400 r4:856ca400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ca400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf55e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010000 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ca400 r7:00000000 r6:83018200 r5:00001000 r4:7f063000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd93000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575578c r4:85755400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575578c r4:8515c200 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ca400 r8:8515c22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c200 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c200 r8:8027f5e8 r7:ebf4de60 r6:85418900 r5:856ca400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf55fb0 to 0xebf55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84361fc0 INFO: task kworker/1:916:5858 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 99376000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) Exception stack(0xe0639fb0 to 0xe0639ff8) r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:917:5859 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:917 state:D stack:0 pid:5859 tgid:5859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf59d84 r8:00000002 r7:60000113 r6:ebf59d8c r5:856cbc00 r4:856cbc00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cbc00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf59e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85509240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebd7d000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575538c r4:85755000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575538c r4:8515c280 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cbc00 r8:8515c2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c280 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c280 r8:8027f5e8 r7:ebf55e60 r6:85418980 r5:856cbc00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf59fb0 to 0xebf59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84361fc0 INFO: task kworker/1:917:5859 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 99713000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:918:5861 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:918 state:D stack:0 pid:5861 tgid:5861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf5dd84 r8:00000002 r7:60000013 r6:ebf5dd8c r5:856ce000 r4:856ce000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856ce000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf5de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010400 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ce000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdc1000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575638c r4:85756000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575638c r4:8515c300 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856ce000 r8:8515c32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c300 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c300 r8:8027f5e8 r7:ebf55e60 r6:85418a00 r5:856ce000 Exception stack(0xebf5dfb0 to 0xebf5dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0639d28 to 0xe0639d70) 9d60: 80230ad4 80239bb0 80070013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:919:5863 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:919 state:D stack:0 pid:5863 tgid:5863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf61d84 r8:00000002 r7:60000013 r6:ebf61d8c r5:856cec00 r4:856cec00 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cec00 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf61e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010240 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebda3000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85755b8c r4:85755800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85755b8c r4:8515c380 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cec00 r8:8515c3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c380 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c380 r8:8027f5e8 r7:ebf5de60 r6:85418a80 r5:856cec00 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf61fb0 to 0xebf61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:85010200 INFO: task kworker/1:919:5863 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 99aa3000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:920:5864 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:920 state:D stack:0 pid:5864 tgid:5864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf65d84 r8:00000002 r7:60000013 r6:ebf65d8c r5:856cd400 r4:856cd400 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cd400 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf65e08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010340 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdab000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:85755f8c r4:85755c00 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85755f8c r4:8515c400 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cd400 r8:8515c42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c400 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c400 r8:8027f5e8 r7:ebf5de60 r6:85418b00 r5:856cd400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf65fb0 to 0xebf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850100c0 INFO: task kworker/1:920:5864 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 99db1000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:921:5867 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:921 state:D stack:0 pid:5867 tgid:5867 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a6245c>] (__schedule_loop kernel/sched/core.c:6859 [inline]) [<81a614d4>] (__schedule) from [<81a6245c>] (schedule+0x2c/0x130 kernel/sched/core.c:6874) r10:829188dc r9:ebf6dd84 r8:00000002 r7:60000113 r6:ebf6dd8c r5:856cb000 r4:856cb000 [<81a62430>] (schedule) from [<81a62844>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6931) r5:856cb000 r4:829188d8 [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a6282c>] (schedule_preempt_disabled) from [<81a64f28>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a64c28>] (__mutex_lock.constprop.0) from [<81a653f4>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf6de08 r4:00000000 [<81a653e0>] (__mutex_lock_slowpath) from [<81a65434>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a653f8>] (mutex_lock) from [<804e3190>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2892) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85010a80 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebdf5000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575738c r4:85757000 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575738c r4:8515c480 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:856cb000 r8:8515c4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c480 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c480 r8:8027f5e8 r7:ebf5de60 r6:85418b80 r5:856cb000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf6dfb0 to 0xebf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850100c0 INFO: task kworker/1:921:5867 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9a140000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84364b8c r4:84364800 r4:84be5180 Exception stack(0xe0639fb0 to 0xe0639ff8) Not tainted 6.15.0-syzkaller #0 r4:8578b000 r10:8280c8dc r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebf45e08 r9:83018205 r8:8578b000 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r5:00001000 r4:ebdcd000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:8575678c r4:85756400 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8575678c r4:8515c500 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:8578b000 r8:8515c52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8515c500 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8515c500 r8:8027f5e8 r7:ebf6de60 r6:8515c580 r5:8578b000 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebf45fb0 to 0xebf45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:850100c0 INFO: task kworker/1:922:5868 is blocked on a mutex likely owned by task kworker/1:290:3828. task:kworker/1:290 state:R running task stack:0 pid:3828 tgid:3828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a614d4>] (__schedule) from [<81a62890>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7104) r10:82ac11c4 r9:84b7d400 r8:80200be4 r7:e0639d5c r6:ffffffff r5:84b7d400 r4:00000000 [<81a62850>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0639d28 to 0xe0639d70) 9d20: 9a34e000 e01b3000 00000001 80239b98 7f641000 00000001 9d40: 82ac05a0 7f641000 e01b3000 8280c930 82ac11c4 e0639da4 e0639da8 e0639d78 9d60: 80230ad4 80239bb0 80070013 ffffffff r5:80070013 r4:80239bb0 [<80230a70>] (flush_tlb_kernel_range) from [<804e2f64>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2316) r4:82ac11e4 [<804e2d54>] (__purge_vmap_area_lazy) from [<804e330c>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2931) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0639dc0 r5:e0639e08 r4:e0639dc0 [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vm_reset_perms mm/vmalloc.c:3326 [inline]) [<804e3128>] (_vm_unmap_aliases) from [<804e7070>] (vfree+0x168/0x204 mm/vmalloc.c:3405) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be43c0 r4:00000000 [<804e6f08>] (vfree) from [<8054697c>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b7d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054694c>] (execmem_free) from [<803c62e4>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e01e9000 [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803c62d4>] (bpf_jit_free_exec) from [<803c66c4>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803c665c>] (bpf_jit_free) from [<803c7754>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2891) r5:84364b8c r4:84364800 [<803c7608>] (bpf_prog_free_deferred) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84364b8c r4:84be5180 [<8027e9e8>] (process_one_work) from [<8027f7e4>] (process_scheduled_works kernel/workqueue.c:3321 [inline]) [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3402) r10:61c88647 r9:84b7d400 r8:84be51ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be5180 [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be5180 r8:8027f5e8 r7:e0631e60 r6:84be5200 r5:84b7d400 r4:00000001 [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 r4:84be4200 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:923:5871 blocked for more than 479 seconds. Not tainted 6.15.0-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.